{"id":11652,"date":"2025-08-23T00:18:36","date_gmt":"2025-08-23T00:18:36","guid":{"rendered":"https:\/\/www.vipservis.com\/blog\/?p=11652"},"modified":"2025-08-23T00:18:36","modified_gmt":"2025-08-23T00:18:36","slug":"almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim","status":"publish","type":"post","link":"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/","title":{"rendered":"AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi: Ad\u0131m Ad\u0131m!"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_79_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">\u0130\u00e7indekiler<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ff0f0f;color:#ff0f0f\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ff0f0f;color:#ff0f0f\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#AlmaLinux_VDS_ESXi_Root_Parolasini_Sifirlama_Rehberi_Adim_Adim\" >AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi: Ad\u0131m Ad\u0131m!<\/a><ul class='ez-toc-list-level-2' ><li class='ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#1_Giris_AlmaLinux_VDS_ve_ESXi_Ortaminda_Root_Parolasinin_Onemi\" >1. Giri\u015f: AlmaLinux VDS ve ESXi Ortam\u0131nda Root Parolas\u0131n\u0131n \u00d6nemi<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#2_ESXi_Uzerinde_AlmaLinux_VDS_Ortaminda_Root_Parolasini_Sifirlamanin_Temel_Yontemleri\" >2. ESXi \u00dczerinde AlmaLinux VDS Ortam\u0131nda Root Parolas\u0131n\u0131 S\u0131f\u0131rlaman\u0131n Temel Y\u00f6ntemleri<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#3_Adim_Adim_GRUB_Menusu_ile_AlmaLinux_VDS_Root_Parolasini_Sifirlama\" >3. Ad\u0131m Ad\u0131m: GRUB Men\u00fcs\u00fc ile AlmaLinux VDS Root Parolas\u0131n\u0131 S\u0131f\u0131rlama<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#4_ESXi_Konsolundan_Dogrudan_Erisim_ile_Root_Parolasini_Sifirlama\" >4. ESXi Konsolundan Do\u011frudan Eri\u015fim ile Root Parolas\u0131n\u0131 S\u0131f\u0131rlama<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#5_Kurtarma_Modu_ile_AlmaLinux_VDS_Root_Parolasini_Sifirlama\" >5. Kurtarma Modu ile AlmaLinux VDS Root Parolas\u0131n\u0131 S\u0131f\u0131rlama<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#6_Guvenlik_Ipuclari_ve_En_Iyi_Uygulamalar\" >6. G\u00fcvenlik \u0130pu\u00e7lar\u0131 ve En \u0130yi Uygulamalar<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#7_Sorun_Giderme_Sik_Karsilasilan_Hatalar_ve_Cozumleri\" >7. Sorun Giderme: S\u0131k Kar\u015f\u0131la\u015f\u0131lan Hatalar ve \u00c7\u00f6z\u00fcmleri<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#8_Sonuc_AlmaLinux_VDS_ESXi_Ortaminda_Guvenli_Parola_Yonetimi\" >8. Sonu\u00e7: AlmaLinux VDS ESXi Ortam\u0131nda G\u00fcvenli Parola Y\u00f6netimi<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h1 id=\"almalinux-vds-esxi-root-parolas-n-s-f-rlama-rehberi-ad-m-ad-m-\"><span class=\"ez-toc-section\" id=\"AlmaLinux_VDS_ESXi_Root_Parolasini_Sifirlama_Rehberi_Adim_Adim\"><\/span>AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi: Ad\u0131m Ad\u0131m!<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<h2 id=\"1-giri-almalinux-vds-ve-esxi-ortam-nda-root-parolas-n-n-nemi\"><span class=\"ez-toc-section\" id=\"1_Giris_AlmaLinux_VDS_ve_ESXi_Ortaminda_Root_Parolasinin_Onemi\"><\/span>1. Giri\u015f: AlmaLinux VDS ve ESXi Ortam\u0131nda Root Parolas\u0131n\u0131n \u00d6nemi<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>AlmaLinux VDS (Sanal \u00d6zel Sunucu) ve ESXi ortam\u0131nda root parolas\u0131n\u0131n \u00f6nemi, sunucu g\u00fcvenli\u011finin ve y\u00f6netilebilirli\u011finin temel ta\u015flar\u0131ndan biridir. Bu rehber, &#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221; ba\u015fl\u0131\u011f\u0131 alt\u0131nda, bu iki teknolojinin birle\u015fiminde root parolas\u0131n\u0131n neden kritik oldu\u011funu ve bu parolay\u0131 g\u00fcvenli bir \u015fekilde nas\u0131l s\u0131f\u0131rlayaca\u011f\u0131n\u0131z\u0131 ad\u0131m ad\u0131m anlatacakt\u0131r.<\/p>\n<p><strong>1.1 Root Parolas\u0131n\u0131n G\u00fcvenlik A\u00e7\u0131s\u0131ndan Kritik Rol\u00fc<\/strong><\/p>\n<p>Root parolas\u0131, Linux sistemlerinde en y\u00fcksek yetkilere sahip olan &#8220;root&#8221; kullan\u0131c\u0131s\u0131n\u0131n hesab\u0131na eri\u015fmek i\u00e7in kullan\u0131lan anahtard\u0131r. Root kullan\u0131c\u0131s\u0131, sistemdeki t\u00fcm dosyalara, dizinlere ve s\u00fcre\u00e7lere eri\u015febilir, bunlar\u0131 de\u011fi\u015ftirebilir ve hatta silebilir. Bu nedenle, root parolas\u0131n\u0131n g\u00fcvenli\u011fi, t\u00fcm sistemin g\u00fcvenli\u011fiyle e\u015fde\u011ferdir. E\u011fer root parolas\u0131 yetkisiz ki\u015filerin eline ge\u00e7erse, sistem tamamen ele ge\u00e7irilebilir, veriler \u00e7al\u0131nabilir, silinebilir veya de\u011fi\u015ftirilebilir, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar y\u00fcklenebilir ve sistem kullan\u0131lamaz hale getirilebilir.<\/p>\n<p>Root parolas\u0131n\u0131n kritik rol\u00fcn\u00fc daha iyi anlamak i\u00e7in a\u015fa\u011f\u0131daki senaryolar\u0131 g\u00f6z \u00f6n\u00fcnde bulundurun:<\/p>\n<ul>\n<li><strong>Veri \u0130hlali:<\/strong> Yetkisiz bir ki\u015fi root parolas\u0131na eri\u015fti\u011finde, hassas verilerinizi (m\u00fc\u015fteri bilgileri, finansal kay\u0131tlar, fikri m\u00fclkiyet vb.) \u00e7alabilir veya silebilir. Bu, i\u015fletmenizin itibar\u0131n\u0131 zedeleyebilir, yasal sorunlara yol a\u00e7abilir ve maddi kay\u0131plara neden olabilir.<\/li>\n<li><strong>Sistem Ele Ge\u00e7irilmesi:<\/strong> K\u00f6t\u00fc niyetli bir sald\u0131rgan root parolas\u0131 ile sisteme girdi\u011finde, web sitenizi tahrif edebilir, spam g\u00f6nderebilir, DDoS sald\u0131r\u0131lar\u0131 d\u00fczenleyebilir veya di\u011fer yasa d\u0131\u015f\u0131 faaliyetler i\u00e7in kullanabilir.<\/li>\n<li><strong>Hizmet Kesintisi:<\/strong> Yetkisiz bir ki\u015fi root parolas\u0131 ile sistem dosyalar\u0131n\u0131 silebilir veya de\u011fi\u015ftirebilir, bu da sunucunun \u00e7\u00f6kmesine ve hizmet kesintisine neden olabilir. Bu, i\u015fletmenizin gelir kayb\u0131na ve m\u00fc\u015fteri memnuniyetsizli\u011fine yol a\u00e7abilir.<\/li>\n<li><strong>K\u00f6t\u00fc Ama\u00e7l\u0131 Yaz\u0131l\u0131m Enfeksiyonu:<\/strong> Sald\u0131rgan root parolas\u0131 ile sisteme k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m (vir\u00fcs, truva at\u0131, fidye yaz\u0131l\u0131m\u0131 vb.) y\u00fckleyebilir. Bu yaz\u0131l\u0131mlar, sisteminizi yava\u015flatabilir, verilerinizi \u015fifreleyebilir veya di\u011fer sistemlere yay\u0131labilir.<\/li>\n<\/ul>\n<p><strong>\u00d6rnek:<\/strong> Bir e-ticaret sitesinin AlmaLinux VDS \u00fczerinde \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 ve ESXi \u00fczerinde sanalla\u015ft\u0131r\u0131ld\u0131\u011f\u0131n\u0131 varsayal\u0131m. E\u011fer root parolas\u0131 zay\u0131fsa veya bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 nedeniyle ele ge\u00e7irilirse, sald\u0131rgan m\u00fc\u015fteri kredi kart\u0131 bilgilerini \u00e7alabilir, web sitesini tahrif edebilir veya sunucuyu fidye yaz\u0131l\u0131m\u0131yla kilitleyebilir. Bu durum, hem \u015firketin itibar\u0131n\u0131 zedeler hem de b\u00fcy\u00fck maddi kay\u0131plara neden olur.<\/p>\n<p>Bu nedenle, root parolas\u0131n\u0131n g\u00fcvenli\u011fini sa\u011flamak, herhangi bir Linux sisteminin, \u00f6zellikle de AlmaLinux VDS ve ESXi ortamlar\u0131nda \u00e7al\u0131\u015fan sunucular\u0131n g\u00fcvenli\u011fi i\u00e7in en \u00f6nemli \u00f6nceliktir.<\/p>\n<p><strong>1.2 AlmaLinux VDS ve ESXi Ortamlar\u0131n\u0131n \u00d6zellikleri ve Kullan\u0131m Alanlar\u0131<\/strong><\/p>\n<p><strong>AlmaLinux VDS:<\/strong><\/p>\n<p>AlmaLinux, CentOS&#8217;un yerini almak \u00fczere geli\u015ftirilen, topluluk taraf\u0131ndan desteklenen, a\u00e7\u0131k kaynakl\u0131 ve \u00fccretsiz bir Linux da\u011f\u0131t\u0131m\u0131d\u0131r. Red Hat Enterprise Linux (RHEL) ile ikili uyumlu oldu\u011fu i\u00e7in, RHEL \u00fczerinde \u00e7al\u0131\u015fan uygulamalar\u0131n ve yaz\u0131l\u0131mlar\u0131n \u00e7o\u011fu AlmaLinux \u00fczerinde de sorunsuz bir \u015fekilde \u00e7al\u0131\u015f\u0131r. VDS (Virtual Dedicated Server), fiziksel bir sunucunun kaynaklar\u0131n\u0131n sanalla\u015ft\u0131rma teknolojileri ile b\u00f6l\u00fcnerek olu\u015fturulan sanal sunucudur. AlmaLinux VDS, kullan\u0131c\u0131ya ayr\u0131lm\u0131\u015f CPU, RAM ve disk alan\u0131 sunar, bu da performans\u0131 ve g\u00fcvenli\u011fi art\u0131r\u0131r.<\/p>\n<ul>\n<li><strong>\u00d6zellikleri:<\/strong>\n<ul>\n<li><strong>Kararl\u0131l\u0131k ve G\u00fcvenilirlik:<\/strong> AlmaLinux, kurumsal d\u00fczeyde bir Linux da\u011f\u0131t\u0131m\u0131d\u0131r ve uzun s\u00fcreli destek (LTS) sunar. Bu, sistemin kararl\u0131 ve g\u00fcvenilir bir \u015fekilde \u00e7al\u0131\u015fmas\u0131n\u0131 sa\u011flar.<\/li>\n<li><strong>G\u00fcvenlik:<\/strong> AlmaLinux, g\u00fcvenlik odakl\u0131 bir yakla\u015f\u0131mla geli\u015ftirilmi\u015ftir ve d\u00fczenli olarak g\u00fcvenlik g\u00fcncellemeleri yay\u0131nlan\u0131r.<\/li>\n<li><strong>Uyumluluk:<\/strong> RHEL ile ikili uyumlu oldu\u011fu i\u00e7in, RHEL \u00fczerinde \u00e7al\u0131\u015fan uygulamalar\u0131n ve yaz\u0131l\u0131mlar\u0131n \u00e7o\u011fu AlmaLinux \u00fczerinde de sorunsuz bir \u015fekilde \u00e7al\u0131\u015f\u0131r.<\/li>\n<li><strong>\u00d6zelle\u015ftirilebilirlik:<\/strong> AlmaLinux, kullan\u0131c\u0131lar\u0131n ihtiya\u00e7lar\u0131na g\u00f6re \u00f6zelle\u015ftirilebilir.<\/li>\n<li><strong>Topluluk Deste\u011fi:<\/strong> Geni\u015f bir topluluk taraf\u0131ndan desteklenir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Kullan\u0131m Alanlar\u0131:<\/strong>\n<ul>\n<li><strong>Web Hosting:<\/strong> Web sitelerini ve uygulamalar\u0131 bar\u0131nd\u0131rmak i\u00e7in idealdir.<\/li>\n<li><strong>Uygulama Sunucusu:<\/strong> Web uygulamalar\u0131n\u0131, veritabanlar\u0131n\u0131 ve di\u011fer uygulamalar\u0131 \u00e7al\u0131\u015ft\u0131rmak i\u00e7in kullan\u0131labilir.<\/li>\n<li><strong>E-posta Sunucusu:<\/strong> E-posta hizmetlerini bar\u0131nd\u0131rmak i\u00e7in kullan\u0131labilir.<\/li>\n<li><strong>Dosya Sunucusu:<\/strong> Dosyalar\u0131 depolamak ve payla\u015fmak i\u00e7in kullan\u0131labilir.<\/li>\n<li><strong>Veritaban\u0131 Sunucusu:<\/strong> Veritabanlar\u0131n\u0131 bar\u0131nd\u0131rmak i\u00e7in kullan\u0131labilir.<\/li>\n<li><strong>Geli\u015ftirme Ortam\u0131:<\/strong> Yaz\u0131l\u0131m geli\u015ftirme ve test ortam\u0131 olarak kullan\u0131labilir.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>ESXi:<\/strong><\/p>\n<p>ESXi, VMware taraf\u0131ndan geli\u015ftirilen, bare-metal (do\u011frudan donan\u0131m \u00fczerine kurulan) bir sanalla\u015ft\u0131rma hiperviz\u00f6r\u00fcd\u00fcr. ESXi, birden fazla sanal makinenin ayn\u0131 fiziksel sunucu \u00fczerinde \u00e7al\u0131\u015fmas\u0131n\u0131 sa\u011flayarak, kaynak kullan\u0131m\u0131n\u0131 optimize eder ve maliyetleri d\u00fc\u015f\u00fcr\u00fcr. ESXi, kurumsal d\u00fczeyde sanalla\u015ft\u0131rma \u00e7\u00f6z\u00fcmleri sunar ve y\u00fcksek performans, g\u00fcvenlik ve \u00f6l\u00e7eklenebilirlik sa\u011flar.<\/p>\n<ul>\n<li><strong>\u00d6zellikleri:<\/strong>\n<ul>\n<li><strong>Y\u00fcksek Performans:<\/strong> ESXi, do\u011frudan donan\u0131m \u00fczerinde \u00e7al\u0131\u015ft\u0131\u011f\u0131 i\u00e7in y\u00fcksek performans sunar.<\/li>\n<li><strong>G\u00fcvenlik:<\/strong> ESXi, g\u00fcvenlik odakl\u0131 bir yakla\u015f\u0131mla geli\u015ftirilmi\u015ftir ve g\u00fcvenlik a\u00e7\u0131klar\u0131 i\u00e7in d\u00fczenli olarak g\u00fcncellenir.<\/li>\n<li><strong>\u00d6l\u00e7eklenebilirlik:<\/strong> ESXi, sanal makinelerin kolayca \u00f6l\u00e7eklenmesini sa\u011flar.<\/li>\n<li><strong>Merkezi Y\u00f6netim:<\/strong> ESXi, VMware vCenter Server ile merkezi olarak y\u00f6netilebilir.<\/li>\n<li><strong>Kaynak Optimizasyonu:<\/strong> ESXi, fiziksel sunucu kaynaklar\u0131n\u0131n verimli bir \u015fekilde kullan\u0131lmas\u0131n\u0131 sa\u011flar.<\/li>\n<li><strong>Y\u00fcksek Kullan\u0131labilirlik:<\/strong> ESXi, y\u00fcksek kullan\u0131labilirlik \u00f6zellikleri sunar (\u00f6rne\u011fin, vMotion, vSphere HA).<\/li>\n<\/ul>\n<\/li>\n<li><strong>Kullan\u0131m Alanlar\u0131:<\/strong>\n<ul>\n<li><strong>Sunucu Konsolidasyonu:<\/strong> Birden fazla fiziksel sunucuyu tek bir fiziksel sunucu \u00fczerinde birle\u015ftirerek, donan\u0131m maliyetlerini d\u00fc\u015f\u00fcr\u00fcr ve enerji tasarrufu sa\u011flar.<\/li>\n<li><strong>Test ve Geli\u015ftirme:<\/strong> Sanal makineler \u00fczerinde test ve geli\u015ftirme ortamlar\u0131 olu\u015fturmak i\u00e7in idealdir.<\/li>\n<li><strong>Felaket Kurtarma:<\/strong> Sanal makinelerin yedeklerini alarak, felaket durumlar\u0131nda h\u0131zl\u0131 bir \u015fekilde kurtarma sa\u011flar.<\/li>\n<li><strong>Bulut Bili\u015fim:<\/strong> \u00d6zel bulut ve hibrit bulut ortamlar\u0131 olu\u015fturmak i\u00e7in kullan\u0131labilir.<\/li>\n<li><strong>Veri Merkezi Sanalla\u015ft\u0131rmas\u0131:<\/strong> T\u00fcm veri merkezini sanalla\u015ft\u0131rmak i\u00e7in kullan\u0131labilir.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>AlmaLinux VDS ve ESXi&#8217;nin Birlikte Kullan\u0131m\u0131:<\/strong><\/p>\n<p>AlmaLinux VDS, ESXi \u00fczerinde sanalla\u015ft\u0131r\u0131lm\u0131\u015f bir ortamda \u00e7al\u0131\u015ft\u0131r\u0131labilir. Bu kombinasyon, a\u015fa\u011f\u0131daki avantajlar\u0131 sunar:<\/p>\n<ul>\n<li><strong>Maliyet Etkinli\u011fi:<\/strong> ESXi, fiziksel sunucu kaynaklar\u0131n\u0131n verimli bir \u015fekilde kullan\u0131lmas\u0131n\u0131 sa\u011flayarak, donan\u0131m maliyetlerini d\u00fc\u015f\u00fcr\u00fcr. AlmaLinux ise \u00fccretsiz bir i\u015fletim sistemi oldu\u011fu i\u00e7in lisans maliyetini ortadan kald\u0131r\u0131r.<\/li>\n<li><strong>\u00d6l\u00e7eklenebilirlik:<\/strong> ESXi, sanal makinelerin kolayca \u00f6l\u00e7eklenmesini sa\u011flar. AlmaLinux VDS&#8217;nin kaynaklar\u0131 (CPU, RAM, disk alan\u0131) ihtiya\u00e7 duyuldu\u011funda kolayca art\u0131r\u0131labilir veya azalt\u0131labilir.<\/li>\n<li><strong>G\u00fcvenlik:<\/strong> Hem AlmaLinux hem de ESXi, g\u00fcvenlik odakl\u0131 bir yakla\u015f\u0131mla geli\u015ftirilmi\u015ftir ve g\u00fcvenlik a\u00e7\u0131klar\u0131 i\u00e7in d\u00fczenli olarak g\u00fcncellenir.<\/li>\n<li><strong>Esneklik:<\/strong> AlmaLinux, kullan\u0131c\u0131lar\u0131n ihtiya\u00e7lar\u0131na g\u00f6re \u00f6zelle\u015ftirilebilir. ESXi ise farkl\u0131 i\u015fletim sistemlerini ve uygulamalar\u0131 ayn\u0131 fiziksel sunucu \u00fczerinde \u00e7al\u0131\u015ft\u0131rmay\u0131 sa\u011flar.<\/li>\n<li><strong>Kolay Y\u00f6netim:<\/strong> ESXi, VMware vCenter Server ile merkezi olarak y\u00f6netilebilir. AlmaLinux ise SSH veya di\u011fer y\u00f6netim ara\u00e7lar\u0131 ile y\u00f6netilebilir.<\/li>\n<\/ul>\n<p><strong>\u00d6rnek:<\/strong> Bir web ajans\u0131, birden fazla m\u00fc\u015fterisinin web sitelerini bar\u0131nd\u0131rmak i\u00e7in AlmaLinux VDS kullanabilir. Ajans, ESXi \u00fczerinde birden fazla AlmaLinux VDS olu\u015fturarak, her m\u00fc\u015fterinin web sitesini ayr\u0131 bir sanal sunucuda bar\u0131nd\u0131rabilir. Bu, her m\u00fc\u015fterinin web sitesinin performans\u0131n\u0131 ve g\u00fcvenli\u011fini art\u0131r\u0131r ve ajans\u0131n kaynak kullan\u0131m\u0131n\u0131 optimize etmesini sa\u011flar.<\/p>\n<p><strong>1.3 Neden Root Parolas\u0131n\u0131 S\u0131f\u0131rlama \u0130htiyac\u0131 Duyulur?<\/strong><\/p>\n<p>AlmaLinux VDS ESXi ortam\u0131nda root parolas\u0131n\u0131 s\u0131f\u0131rlama ihtiyac\u0131 \u00e7e\u015fitli nedenlerden kaynaklanabilir. Bu nedenler genellikle g\u00fcvenlik ihlalleri, parola unutma veya VDS y\u00f6netimindeki zorluklarla ilgilidir. \u0130\u015fte en yayg\u0131n nedenlerden baz\u0131lar\u0131:<\/p>\n<ul>\n<li><strong>Parola Unutma:<\/strong> Bu, en s\u0131k kar\u015f\u0131la\u015f\u0131lan nedendir. Sistem y\u00f6neticisi veya kullan\u0131c\u0131, root parolas\u0131n\u0131 unutabilir. \u00d6zellikle karma\u015f\u0131k ve g\u00fcvenli parolalar kullan\u0131ld\u0131\u011f\u0131nda, parolay\u0131 hat\u0131rlamak zor olabilir. Parola unutuldu\u011funda, sisteme eri\u015fim m\u00fcmk\u00fcn olmaz ve parolan\u0131n s\u0131f\u0131rlanmas\u0131 gerekir.<\/li>\n<li><strong>G\u00fcvenlik \u0130hlali:<\/strong> Root parolas\u0131n\u0131n yetkisiz ki\u015filerin eline ge\u00e7mesi durumunda, parolan\u0131n derhal s\u0131f\u0131rlanmas\u0131 gerekir. Bu durum, bir sald\u0131rgan\u0131n sisteme eri\u015fti\u011fini veya bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n istismar edildi\u011fini g\u00f6sterir. Parola s\u0131f\u0131rland\u0131ktan sonra, sistemin g\u00fcvenli\u011fini sa\u011flamak i\u00e7in ek \u00f6nlemler al\u0131nmal\u0131d\u0131r.<\/li>\n<li><strong>Personel De\u011fi\u015fikli\u011fi:<\/strong> Bir sistem y\u00f6neticisi \u015firketten ayr\u0131ld\u0131\u011f\u0131nda, onun kulland\u0131\u011f\u0131 root parolas\u0131n\u0131n s\u0131f\u0131rlanmas\u0131 gerekir. Bu, eski \u00e7al\u0131\u015fan\u0131n sisteme eri\u015fimini engeller ve \u015firketin verilerinin ve sistemlerinin g\u00fcvenli\u011fini sa\u011flar.<\/li>\n<li><strong>VDS Y\u00f6netimindeki Zorluklar:<\/strong> Baz\u0131 durumlarda, VDS&#8217;nin y\u00f6netimiyle ilgili sorunlar nedeniyle root parolas\u0131n\u0131n s\u0131f\u0131rlanmas\u0131 gerekebilir. \u00d6rne\u011fin, bir sistem hatas\u0131 veya bir yap\u0131land\u0131rma sorunu nedeniyle root hesab\u0131na eri\u015fim engellenebilir.<\/li>\n<li><strong>Sistem Bak\u0131m\u0131 ve G\u00fcncelleme:<\/strong> Baz\u0131 sistem bak\u0131m\u0131 ve g\u00fcncelleme i\u015flemleri, root eri\u015fimi gerektirebilir. E\u011fer root parolas\u0131 bilinmiyorsa, bu i\u015flemler ger\u00e7ekle\u015ftirilemez ve parolan\u0131n s\u0131f\u0131rlanmas\u0131 gerekir.<\/li>\n<li><strong>Denetim ve Uyumluluk:<\/strong> Baz\u0131 denetim ve uyumluluk gereksinimleri, d\u00fczenli olarak parola de\u011fi\u015fikliklerini ve root parolas\u0131n\u0131n g\u00fcvenli\u011fini kontrol etmeyi gerektirebilir. Bu durumlarda, root parolas\u0131n\u0131n d\u00fczenli olarak s\u0131f\u0131rlanmas\u0131 ve g\u00fcncellenmesi gerekebilir.<\/li>\n<li><strong>Sald\u0131r\u0131 Sonras\u0131 Temizlik:<\/strong> Bir sald\u0131r\u0131dan sonra, sistemin temizlenmesi ve g\u00fcvenli\u011finin yeniden sa\u011flanmas\u0131 i\u00e7in root parolas\u0131n\u0131n s\u0131f\u0131rlanmas\u0131 ve di\u011fer g\u00fcvenlik \u00f6nlemlerinin al\u0131nmas\u0131 \u00f6nemlidir.<\/li>\n<\/ul>\n<p><strong>\u00d6rnek:<\/strong> Bir \u015firketin sistem y\u00f6neticisi, karma\u015f\u0131k bir root parolas\u0131 belirlemi\u015f ancak parolay\u0131 g\u00fcvenli bir yere kaydetmeyi unutmu\u015ftur. Birka\u00e7 ay sonra, sistemde bir de\u011fi\u015fiklik yapmak gerekti\u011finde root parolas\u0131na ihtiya\u00e7 duyar, ancak parolay\u0131 hat\u0131rlayamaz. Bu durumda, sistem y\u00f6neticisinin root parolas\u0131n\u0131 s\u0131f\u0131rlamas\u0131 gerekir.<\/p>\n<p><strong>\u00d6rnek:<\/strong> Bir web sitesi, bir DDoS sald\u0131r\u0131s\u0131na maruz kal\u0131r ve sald\u0131rganlar sisteme eri\u015fmeyi ba\u015far\u0131r. Sald\u0131rganlar, root parolas\u0131na eri\u015ferek sistemi ele ge\u00e7irir. Bu durumda, \u015firketin derhal root parolas\u0131n\u0131 s\u0131f\u0131rlamas\u0131 ve sistemin g\u00fcvenli\u011fini sa\u011flamak i\u00e7in ek \u00f6nlemler almas\u0131 gerekir.<\/p>\n<p>Bu nedenlerden dolay\u0131, AlmaLinux VDS ESXi ortam\u0131nda root parolas\u0131n\u0131 s\u0131f\u0131rlama y\u00f6ntemlerini bilmek ve g\u00fcvenli bir \u015fekilde uygulayabilmek, sistem y\u00f6neticileri ve VDS kullan\u0131c\u0131lar\u0131 i\u00e7in kritik bir beceridir. Bu rehberin ilerleyen b\u00f6l\u00fcmlerinde, root parolas\u0131n\u0131 s\u0131f\u0131rlaman\u0131n farkl\u0131 y\u00f6ntemlerini ad\u0131m ad\u0131m anlatacak ve g\u00fcvenlik ipu\u00e7lar\u0131 sunaca\u011f\u0131z.<\/p>\n<h2 id=\"2-esxi-zerinde-almalinux-vds-ortam-nda-root-parolas-n-s-f-rlaman-n-temel-y-ntemleri\"><span class=\"ez-toc-section\" id=\"2_ESXi_Uzerinde_AlmaLinux_VDS_Ortaminda_Root_Parolasini_Sifirlamanin_Temel_Yontemleri\"><\/span>2. ESXi \u00dczerinde AlmaLinux VDS Ortam\u0131nda Root Parolas\u0131n\u0131 S\u0131f\u0131rlaman\u0131n Temel Y\u00f6ntemleri<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>ESXi \u00fczerinde bir AlmaLinux VDS ortam\u0131nda root parolas\u0131n\u0131 s\u0131f\u0131rlamak, \u00e7e\u015fitli y\u00f6ntemlerle ger\u00e7ekle\u015ftirilebilir. Hangi y\u00f6ntemin kullan\u0131laca\u011f\u0131, eri\u015fim seviyenize, ESXi ortam\u0131n\u0131n yap\u0131land\u0131rmas\u0131na ve tercihlerinize ba\u011fl\u0131d\u0131r. Bu b\u00f6l\u00fcmde, ESXi \u00fczerinde \u00e7al\u0131\u015fan bir AlmaLinux VDS&#8217;de root parolas\u0131n\u0131 s\u0131f\u0131rlaman\u0131n en temel ve yayg\u0131n y\u00f6ntemlerini detayl\u0131 bir \u015fekilde inceleyece\u011fiz. Her bir y\u00f6ntemin avantajlar\u0131, dezavantajlar\u0131 ve ad\u0131m ad\u0131m uygulama ad\u0131mlar\u0131 a\u00e7\u0131klanacakt\u0131r.<\/p>\n<p><strong>2.1 ESXi Konsolundan M\u00fcdahale: Do\u011frudan Eri\u015fim Y\u00f6ntemi<\/strong><\/p>\n<p>Bu y\u00f6ntem, ESXi sunucusuna do\u011frudan eri\u015fiminiz varsa en h\u0131zl\u0131 ve do\u011frudan \u00e7\u00f6z\u00fcmd\u00fcr. ESXi konsoluna eri\u015fim, genellikle ESXi host&#8217;unun fiziksel konsolu veya SSH \u00fczerinden sa\u011flan\u0131r. Bu y\u00f6ntem, sanal makineye (AlmaLinux VDS) do\u011frudan eri\u015fim imkan\u0131 sundu\u011fu i\u00e7in, parola s\u0131f\u0131rlama i\u015flemini nispeten kolayla\u015ft\u0131r\u0131r.<\/p>\n<ul>\n<li><strong>Avantajlar\u0131:<\/strong>\n<ul>\n<li><strong>H\u0131zl\u0131 ve Do\u011frudan:<\/strong> Parola s\u0131f\u0131rlama i\u015flemi, di\u011fer y\u00f6ntemlere g\u00f6re daha h\u0131zl\u0131 ve do\u011frudan ger\u00e7ekle\u015ftirilebilir.<\/li>\n<li><strong>Eri\u015fim Kontrol\u00fc:<\/strong> ESXi konsoluna eri\u015fim, genellikle yetkilendirilmi\u015f sistem y\u00f6neticileri taraf\u0131ndan kontrol edildi\u011fi i\u00e7in g\u00fcvenlidir.<\/li>\n<li><strong>Ba\u011f\u0131ms\u0131zl\u0131k:<\/strong> Di\u011fer y\u00f6ntemlerdeki gibi, i\u015fletim sisteminin veya a\u011f yap\u0131land\u0131rmas\u0131n\u0131n \u00e7al\u0131\u015f\u0131r durumda olmas\u0131na gerek yoktur.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Dezavantajlar\u0131:<\/strong>\n<ul>\n<li><strong>Eri\u015fim Gereksinimi:<\/strong> ESXi konsoluna fiziksel veya SSH eri\u015fimi gerektirir. Bu, her zaman m\u00fcmk\u00fcn olmayabilir.<\/li>\n<li><strong>Teknik Bilgi:<\/strong> ESXi komut sat\u0131r\u0131n\u0131 ve Linux komutlar\u0131n\u0131 bilmeyi gerektirebilir.<\/li>\n<li><strong>Kesinti S\u00fcresi:<\/strong> Sanal makineyi yeniden ba\u015flatmak veya kapatmak gerekebilir, bu da k\u0131sa bir kesinti s\u00fcresine neden olabilir.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Ad\u0131m Ad\u0131m Uygulama:<\/strong><\/p>\n<ol>\n<li><strong>ESXi Sunucusuna Eri\u015fim:<\/strong> ESXi host&#8217;una SSH ile ba\u011flan\u0131n veya fiziksel konsolunu kullan\u0131n. SSH kullan\u0131yorsan\u0131z, ESXi host&#8217;unun IP adresini ve root hesab\u0131n\u0131 kullanarak ba\u011flanman\u0131z gerekir.\n<pre><code class=\"lang-bash\">ssh root@<span class=\"hljs-tag\">&lt;<span class=\"hljs-name\">ESXi_IP_Adresi<\/span>&gt;<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li><strong>Sanal Makineyi (AlmaLinux VDS) Bulma:<\/strong> ESXi komut sat\u0131r\u0131nda, \u00e7al\u0131\u015fan sanal makinelerin listesini g\u00f6r\u00fcnt\u00fclemek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\">vim-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> vmsvc\/getallvms<\/span>\r\n<\/code><\/pre>\n<p>Bu komut, \u00e7al\u0131\u015fan sanal makinelerin ID&#8217;lerini, adlar\u0131n\u0131 ve i\u015fletim sistemlerini listeleyecektir. AlmaLinux VDS&#8217;nizin ad\u0131n\u0131 bulun ve ID&#8217;sini not al\u0131n.<\/li>\n<li><strong>Sanal Makine Konsoluna Eri\u015fme:<\/strong> AlmaLinux VDS&#8217;nizin konsoluna eri\u015fmek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n, <code>&lt;VM_ID&gt;<\/code> k\u0131sm\u0131n\u0131 not ald\u0131\u011f\u0131n\u0131z ID ile de\u011fi\u015ftirin:\n<pre><code class=\"lang-bash\">vim-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> vmsvc\/console &lt;VM_ID&gt;<\/span>\r\n<\/code><\/pre>\n<p>Bu komut, sanal makine konsolunu a\u00e7acakt\u0131r. E\u011fer konsol a\u00e7\u0131lmazsa veya ba\u015fka bir sorunla kar\u015f\u0131la\u015f\u0131rsan\u0131z, ESXi aray\u00fcz\u00fcnden (vSphere Client) sanal makine konsoluna eri\u015fmeyi deneyebilirsiniz.<\/li>\n<li><strong>Sanal Makineyi Yeniden Ba\u015flatma (Gerekirse):<\/strong> E\u011fer sanal makine yan\u0131t vermiyorsa veya GRUB men\u00fcs\u00fcne eri\u015fmekte zorlan\u0131yorsan\u0131z, sanal makineyi yeniden ba\u015flatman\u0131z gerekebilir. Yeniden ba\u015flatmak i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\">vim-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> vmsvc\/power.reboot &lt;VM_ID&gt;<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li><strong>GRUB Men\u00fcs\u00fcne Giri\u015f:<\/strong> Sanal makine yeniden ba\u015flat\u0131l\u0131rken, GRUB men\u00fcs\u00fcne eri\u015fmek i\u00e7in klavyenizdeki <strong>Esc<\/strong> veya <strong>Shift<\/strong> tu\u015flar\u0131na bas\u0131l\u0131 tutun. Bu, GRUB men\u00fcs\u00fcn\u00fc g\u00f6r\u00fcnt\u00fcleyecektir. E\u011fer GRUB men\u00fcs\u00fc g\u00f6r\u00fcnt\u00fclenmezse, sanal makinenin BIOS ayarlar\u0131nda POST ekran\u0131nda klavye giri\u015fini etkinle\u015ftirmeniz gerekebilir.<\/li>\n<li><strong>GRUB&#8217;da D\u00fczenleme Moduna Ge\u00e7me:<\/strong> GRUB men\u00fcs\u00fcnde, AlmaLinux se\u00e7ene\u011fini se\u00e7in ve <strong>e<\/strong> tu\u015funa basarak d\u00fczenleme moduna ge\u00e7in. Bu, GRUB yap\u0131land\u0131rma dosyas\u0131n\u0131 d\u00fczenlemenize olanak tan\u0131r.<\/li>\n<li><strong><code>linux<\/code> Sat\u0131r\u0131n\u0131 D\u00fczenleme:<\/strong> GRUB yap\u0131land\u0131rma dosyas\u0131nda, <code>linux<\/code> veya <code>linux16<\/code> ile ba\u015flayan bir sat\u0131r bulun. Bu sat\u0131r, \u00e7ekirdek ba\u015flatma parametrelerini i\u00e7erir. Bu sat\u0131r\u0131n sonuna <code>rd.break enforcing=0<\/code> parametresini ekleyin. Bu parametre, sistemin ba\u015flang\u0131c\u0131nda k\u00f6k dosya sistemini okuma\/yazma modunda yeniden monte etmenizi ve SELinux&#8217;u devre d\u0131\u015f\u0131 b\u0131rakman\u0131z\u0131 sa\u011flar.\n<p><strong>\u00d6rnek:<\/strong><\/p>\n<pre><code>linux <span class=\"hljs-regexp\">\/boot\/<\/span>vmlinuz-<span class=\"hljs-number\">4.18<\/span>.<span class=\"hljs-number\">0<\/span>-<span class=\"hljs-number\">305<\/span>.el8.x86_64 root=<span class=\"hljs-regexp\">\/dev\/m<\/span>apper<span class=\"hljs-regexp\">\/almalinux-root ro crashkernel=auto resume=\/<\/span>dev<span class=\"hljs-regexp\">\/mapper\/<\/span>almalinux-swap rhgb quiet rd.<span class=\"hljs-keyword\">break<\/span> enforcing=<span class=\"hljs-number\">0<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li><strong>De\u011fi\u015fiklikleri Kaydetme ve Ba\u015flatma:<\/strong> De\u011fi\u015fiklikleri kaydetmek ve sistemi ba\u015flatmak i\u00e7in <strong>Ctrl + X<\/strong> veya <strong>F10<\/strong> tu\u015flar\u0131na bas\u0131n. Bu, sistemi tek kullan\u0131c\u0131 modunda ba\u015flatacakt\u0131r.<\/li>\n<li><strong>K\u00f6k Dosya Sistemini Yeniden Montajlama:<\/strong> Sistem tek kullan\u0131c\u0131 modunda ba\u015flat\u0131ld\u0131\u011f\u0131nda, k\u00f6k dosya sistemini okuma\/yazma modunda yeniden monte etmeniz gerekir. Bunun i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">mount<\/span> -o remount,rw \/sysroot\r\n<\/code><\/pre>\n<\/li>\n<li><strong><code>chroot<\/code> ile K\u00f6k Dizine Ge\u00e7me:<\/strong> K\u00f6k dizine ge\u00e7mek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">chroot<\/span> \/sysroot\r\n<\/code><\/pre>\n<p>Bu komut, mevcut kabu\u011funuzu k\u00f6k dizine y\u00f6nlendirecektir.<\/li>\n<li><strong>Root Parolas\u0131n\u0131 De\u011fi\u015ftirme:<\/strong> Root parolas\u0131n\u0131 de\u011fi\u015ftirmek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">passwd<\/span>\r\n<\/code><\/pre>\n<p>Bu komut, yeni bir root parolas\u0131 girmenizi isteyecektir. G\u00fc\u00e7l\u00fc ve benzersiz bir parola se\u00e7ti\u011finizden emin olun. Parolay\u0131 iki kez girerek do\u011frulay\u0131n.<\/li>\n<li><strong>SELinux Etiketlerini G\u00fcncelleme:<\/strong> E\u011fer SELinux devre d\u0131\u015f\u0131 b\u0131rak\u0131ld\u0131ysa (<code>enforcing=0<\/code> parametresi ile), sistemi yeniden ba\u015flatt\u0131ktan sonra SELinux etiketlerini g\u00fcncellemeniz gerekir. Bunun i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">touch<\/span> \/.autorelabel\r\n<\/code><\/pre>\n<p>Bu komut, sistemin yeniden ba\u015flat\u0131lmas\u0131ndan sonra SELinux etiketlerini otomatik olarak g\u00fcncellemesini sa\u011flayacakt\u0131r.<\/li>\n<li><strong>Sistemi Yeniden Ba\u015flatma:<\/strong> Sistemi yeniden ba\u015flatmak i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">exit<\/span>\r\n<span class=\"hljs-keyword\">exit<\/span>\r\nreboot\r\n<\/code><\/pre>\n<p>Bu komut, sistemi yeniden ba\u015flatacak ve yeni root parolas\u0131 ile giri\u015f yapabileceksiniz.<\/li>\n<\/ol>\n<p><strong>2.2 GRUB Men\u00fcs\u00fcn\u00fc Kullanarak Parola S\u0131f\u0131rlama<\/strong><\/p>\n<p>Bu y\u00f6ntem, ESXi konsoluna do\u011frudan eri\u015fiminizin olmad\u0131\u011f\u0131 durumlarda da kullan\u0131labilir. GRUB (GRand Unified Bootloader), i\u015fletim sistemini ba\u015flatmak i\u00e7in kullan\u0131lan bir \u00f6ny\u00fckleyicidir. GRUB men\u00fcs\u00fc, sistemin ba\u015flang\u0131c\u0131nda g\u00f6r\u00fcnt\u00fclenir ve kullan\u0131c\u0131n\u0131n farkl\u0131 i\u015fletim sistemlerini veya kurtarma se\u00e7eneklerini se\u00e7mesine olanak tan\u0131r. Bu y\u00f6ntemde, GRUB men\u00fcs\u00fcn\u00fc kullanarak \u00e7ekirdek ba\u015flatma parametrelerini de\u011fi\u015ftirerek, root parolas\u0131n\u0131 s\u0131f\u0131rlama i\u015flemini ger\u00e7ekle\u015ftirebilirsiniz.<\/p>\n<ul>\n<li><strong>Avantajlar\u0131:<\/strong>\n<ul>\n<li><strong>Geni\u015f Uygulanabilirlik:<\/strong> ESXi konsoluna do\u011frudan eri\u015fim gerektirmez.<\/li>\n<li><strong>Kurtarma Se\u00e7ene\u011fi:<\/strong> Sistemde bir sorun oldu\u011funda, kurtarma se\u00e7ene\u011fi olarak kullan\u0131labilir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Dezavantajlar\u0131:<\/strong>\n<ul>\n<li><strong>GRUB Bilgisi:<\/strong> GRUB men\u00fcs\u00fcn\u00fc ve yap\u0131land\u0131rma dosyalar\u0131n\u0131 anlamay\u0131 gerektirebilir.<\/li>\n<li><strong>Zaman Al\u0131c\u0131:<\/strong> Di\u011fer y\u00f6ntemlere g\u00f6re daha fazla zaman alabilir.<\/li>\n<li><strong>Hata Riski:<\/strong> Yanl\u0131\u015f yap\u0131land\u0131rma, sistemin ba\u015flat\u0131lamamas\u0131na neden olabilir.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Ad\u0131m Ad\u0131m Uygulama:<\/strong><\/p>\n<ol>\n<li><strong>VDS&#8217;yi Yeniden Ba\u015flatma:<\/strong> AlmaLinux VDS&#8217;nizi yeniden ba\u015flat\u0131n. ESXi aray\u00fcz\u00fcnden (vSphere Client) sanal makineyi yeniden ba\u015flatabilirsiniz.<\/li>\n<li><strong>GRUB Men\u00fcs\u00fcne Giri\u015f:<\/strong> Sanal makine yeniden ba\u015flat\u0131l\u0131rken, GRUB men\u00fcs\u00fcne eri\u015fmek i\u00e7in klavyenizdeki <strong>Esc<\/strong> veya <strong>Shift<\/strong> tu\u015flar\u0131na bas\u0131l\u0131 tutun. Bu, GRUB men\u00fcs\u00fcn\u00fc g\u00f6r\u00fcnt\u00fcleyecektir. E\u011fer GRUB men\u00fcs\u00fc g\u00f6r\u00fcnt\u00fclenmezse, sanal makinenin BIOS ayarlar\u0131nda POST ekran\u0131nda klavye giri\u015fini etkinle\u015ftirmeniz gerekebilir.<\/li>\n<li><strong>GRUB&#8217;da D\u00fczenleme Moduna Ge\u00e7me:<\/strong> GRUB men\u00fcs\u00fcnde, AlmaLinux se\u00e7ene\u011fini se\u00e7in ve <strong>e<\/strong> tu\u015funa basarak d\u00fczenleme moduna ge\u00e7in. Bu, GRUB yap\u0131land\u0131rma dosyas\u0131n\u0131 d\u00fczenlemenize olanak tan\u0131r.<\/li>\n<li><strong><code>linux<\/code> Sat\u0131r\u0131n\u0131 D\u00fczenleme:<\/strong> GRUB yap\u0131land\u0131rma dosyas\u0131nda, <code>linux<\/code> veya <code>linux16<\/code> ile ba\u015flayan bir sat\u0131r bulun. Bu sat\u0131r, \u00e7ekirdek ba\u015flatma parametrelerini i\u00e7erir. Bu sat\u0131r\u0131n sonuna <code>rd.break enforcing=0<\/code> parametresini ekleyin.\n<p><strong>\u00d6rnek:<\/strong><\/p>\n<pre><code>linux <span class=\"hljs-regexp\">\/boot\/<\/span>vmlinuz-<span class=\"hljs-number\">4.18<\/span>.<span class=\"hljs-number\">0<\/span>-<span class=\"hljs-number\">305<\/span>.el8.x86_64 root=<span class=\"hljs-regexp\">\/dev\/m<\/span>apper<span class=\"hljs-regexp\">\/almalinux-root ro crashkernel=auto resume=\/<\/span>dev<span class=\"hljs-regexp\">\/mapper\/<\/span>almalinux-swap rhgb quiet rd.<span class=\"hljs-keyword\">break<\/span> enforcing=<span class=\"hljs-number\">0<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li><strong>De\u011fi\u015fiklikleri Kaydetme ve Ba\u015flatma:<\/strong> De\u011fi\u015fiklikleri kaydetmek ve sistemi ba\u015flatmak i\u00e7in <strong>Ctrl + X<\/strong> veya <strong>F10<\/strong> tu\u015flar\u0131na bas\u0131n. Bu, sistemi tek kullan\u0131c\u0131 modunda ba\u015flatacakt\u0131r.<\/li>\n<li><strong>K\u00f6k Dosya Sistemini Yeniden Montajlama:<\/strong> Sistem tek kullan\u0131c\u0131 modunda ba\u015flat\u0131ld\u0131\u011f\u0131nda, k\u00f6k dosya sistemini okuma\/yazma modunda yeniden monte etmeniz gerekir. Bunun i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">mount<\/span> -o remount,rw \/sysroot\r\n<\/code><\/pre>\n<\/li>\n<li><strong><code>chroot<\/code> ile K\u00f6k Dizine Ge\u00e7me:<\/strong> K\u00f6k dizine ge\u00e7mek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">chroot<\/span> \/sysroot\r\n<\/code><\/pre>\n<\/li>\n<li><strong>Root Parolas\u0131n\u0131 De\u011fi\u015ftirme:<\/strong> Root parolas\u0131n\u0131 de\u011fi\u015ftirmek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">passwd<\/span>\r\n<\/code><\/pre>\n<p>Bu komut, yeni bir root parolas\u0131 girmenizi isteyecektir. G\u00fc\u00e7l\u00fc ve benzersiz bir parola se\u00e7ti\u011finizden emin olun. Parolay\u0131 iki kez girerek do\u011frulay\u0131n.<\/li>\n<li><strong>SELinux Etiketlerini G\u00fcncelleme:<\/strong> E\u011fer SELinux devre d\u0131\u015f\u0131 b\u0131rak\u0131ld\u0131ysa (<code>enforcing=0<\/code> parametresi ile), sistemi yeniden ba\u015flatt\u0131ktan sonra SELinux etiketlerini g\u00fcncellemeniz gerekir. Bunun i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">touch<\/span> \/.autorelabel\r\n<\/code><\/pre>\n<\/li>\n<li><strong>Sistemi Yeniden Ba\u015flatma:<\/strong> Sistemi yeniden ba\u015flatmak i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">exit<\/span>\r\n<span class=\"hljs-keyword\">exit<\/span>\r\nreboot\r\n<\/code><\/pre>\n<p>Bu komut, sistemi yeniden ba\u015flatacak ve yeni root parolas\u0131 ile giri\u015f yapabileceksiniz.<\/li>\n<\/ol>\n<p><strong>2.3 Kurtarma Modu ile Parola De\u011fi\u015ftirme<\/strong><\/p>\n<p>Bu y\u00f6ntem, sistemin\u6b63\u5e38 \u015fekilde ba\u015flat\u0131lamad\u0131\u011f\u0131 veya GRUB men\u00fcs\u00fcne eri\u015filemedi\u011fi durumlarda kullan\u0131labilir. Kurtarma modu, genellikle bir ISO dosyas\u0131 arac\u0131l\u0131\u011f\u0131yla ba\u015flat\u0131lan ve sistemin temel i\u015flevlerini onarmaya veya kurtarmaya y\u00f6nelik ara\u00e7lar sunan bir ortamd\u0131r. Bu y\u00f6ntemde, bir kurtarma ISO&#8217;sunu ESXi&#8217;ye y\u00fckleyerek ve VDS&#8217;yi bu ISO&#8217;dan ba\u015flatarak, root parolas\u0131n\u0131 s\u0131f\u0131rlama i\u015flemini ger\u00e7ekle\u015ftirebilirsiniz.<\/p>\n<ul>\n<li><strong>Avantajlar\u0131:<\/strong>\n<ul>\n<li><strong>Kapsaml\u0131 Kurtarma:<\/strong> Sistem \uc815\uc0c1 \u015fekilde ba\u015flat\u0131lamad\u0131\u011f\u0131nda bile kullan\u0131labilir.<\/li>\n<li><strong>\u00c7e\u015fitli Ara\u00e7lar:<\/strong> Kurtarma modu, sistem onar\u0131m\u0131 ve kurtarma i\u00e7in \u00e7e\u015fitli ara\u00e7lar sunar.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Dezavantajlar\u0131:<\/strong>\n<ul>\n<li><strong>ISO Dosyas\u0131 Gereksinimi:<\/strong> Kurtarma ISO&#8217;sunun indirilmesi ve ESXi&#8217;ye y\u00fcklenmesi gerekir.<\/li>\n<li><strong>Daha Karma\u015f\u0131k:<\/strong> Di\u011fer y\u00f6ntemlere g\u00f6re daha karma\u015f\u0131k olabilir.<\/li>\n<li><strong>Teknik Bilgi:<\/strong> Kurtarma modunu ve komut sat\u0131r\u0131n\u0131 kullanmay\u0131 gerektirebilir.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Ad\u0131m Ad\u0131m Uygulama:<\/strong><\/p>\n<ol>\n<li><strong>Kurtarma ISO Dosyas\u0131n\u0131 \u0130ndirme:<\/strong> AlmaLinux i\u00e7in bir kurtarma ISO dosyas\u0131 indirin. AlmaLinux&#8217;in resmi web sitesinden veya g\u00fcvenilir bir kaynaktan indirebilirsiniz.<\/li>\n<li><strong>ISO Dosyas\u0131n\u0131 ESXi&#8217;ye Y\u00fckleme:<\/strong> \u0130ndirdi\u011finiz ISO dosyas\u0131n\u0131 ESXi datastore&#8217;una y\u00fckleyin. ESXi aray\u00fcz\u00fcnden (vSphere Client), datastore&#8217;a dosya y\u00fckleme i\u015flemini ger\u00e7ekle\u015ftirebilirsiniz.<\/li>\n<li><strong>VDS&#8217;nin Sanal Makine Ayarlar\u0131n\u0131 D\u00fczenleme:<\/strong> ESXi aray\u00fcz\u00fcnden, AlmaLinux VDS&#8217;nizin sanal makine ayarlar\u0131n\u0131 d\u00fczenleyin. Sanal makinenin CD\/DVD s\u00fcr\u00fcc\u00fcs\u00fcn\u00fc ekleyin ve ISO dosyas\u0131n\u0131 s\u00fcr\u00fcc\u00fcye ba\u011flay\u0131n. Ayr\u0131ca, sanal makinenin BIOS ayarlar\u0131nda, CD\/DVD s\u00fcr\u00fcc\u00fcs\u00fcnden ba\u015flatma \u00f6nceli\u011fini ayarlay\u0131n.<\/li>\n<li><strong>VDS&#8217;yi Kurtarma Modunda Ba\u015flatma:<\/strong> Sanal makineyi yeniden ba\u015flat\u0131n. Sanal makine, ISO dosyas\u0131ndan ba\u015flat\u0131lacak ve kurtarma moduna girecektir.<\/li>\n<li><strong>K\u00f6k Dosya Sistemini Montajlama:<\/strong> Kurtarma modunda, k\u00f6k dosya sistemini bulman\u0131z ve montajlaman\u0131z gerekir. Bunun i\u00e7in a\u015fa\u011f\u0131daki komutlar\u0131 kullanabilirsiniz:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">lsblk<\/span>\r\n<\/code><\/pre>\n<p>Bu komut, mevcut disk b\u00f6l\u00fcmlerini listeleyecektir. K\u00f6k dosya sistemini i\u00e7eren b\u00f6l\u00fcm\u00fc bulun (\u00f6rne\u011fin, <code>\/dev\/mapper\/almalinux-root<\/code>).<\/p>\n<pre><code class=\"lang-bash\">mount <span class=\"hljs-regexp\">\/dev\/m<\/span>apper<span class=\"hljs-regexp\">\/almalinux-root \/m<\/span>nt\r\n<\/code><\/pre>\n<p>Bu komut, k\u00f6k dosya sistemini <code>\/mnt<\/code> dizinine monte edecektir.<\/li>\n<li><strong><code>chroot<\/code> ile K\u00f6k Dizine Ge\u00e7me:<\/strong> K\u00f6k dizine ge\u00e7mek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">chroot<\/span> \/mnt\r\n<\/code><\/pre>\n<\/li>\n<li><strong>Root Parolas\u0131n\u0131 De\u011fi\u015ftirme:<\/strong> Root parolas\u0131n\u0131 de\u011fi\u015ftirmek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">passwd<\/span>\r\n<\/code><\/pre>\n<p>Bu komut, yeni bir root parolas\u0131 girmenizi isteyecektir. G\u00fc\u00e7l\u00fc ve benzersiz bir parola se\u00e7ti\u011finizden emin olun. Parolay\u0131 iki kez girerek do\u011frulay\u0131n.<\/li>\n<li><strong>Sistemi Yeniden Ba\u015flatma:<\/strong> Sistemi yeniden ba\u015flatmak i\u00e7in a\u015fa\u011f\u0131daki komutlar\u0131 kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">exit<\/span>\r\numount \/mnt\r\nreboot\r\n<\/code><\/pre>\n<p>Sistemi yeniden ba\u015flatmadan \u00f6nce, sanal makine ayarlar\u0131ndan CD\/DVD s\u00fcr\u00fcc\u00fcs\u00fcn\u00fc kald\u0131r\u0131n veya ISO dosyas\u0131n\u0131 s\u00fcr\u00fcc\u00fcden ay\u0131r\u0131n. Bu, sistemin kurtarma modunda tekrar ba\u015flat\u0131lmas\u0131n\u0131 engelleyecektir.<\/li>\n<\/ol>\n<p><strong>2.4 VDS Kontrol Paneli \u00dczerinden Parola S\u0131f\u0131rlama (Varsa)<\/strong><\/p>\n<p>Baz\u0131 VDS sa\u011flay\u0131c\u0131lar\u0131, kullan\u0131c\u0131lar\u0131n VDS&#8217;lerini y\u00f6netmeleri i\u00e7in bir kontrol paneli sunar. Bu kontrol panelleri, genellikle root parolas\u0131n\u0131 s\u0131f\u0131rlama gibi temel y\u00f6netim i\u015flevlerini i\u00e7erir. E\u011fer VDS sa\u011flay\u0131c\u0131n\u0131z bir kontrol paneli sunuyorsa, bu y\u00f6ntem en kolay ve kullan\u0131c\u0131 dostu \u00e7\u00f6z\u00fcm olabilir.<\/p>\n<ul>\n<li><strong>Avantajlar\u0131:<\/strong>\n<ul>\n<li><strong>Kullan\u0131c\u0131 Dostu:<\/strong> Kontrol panelleri, genellikle grafiksel bir aray\u00fcz sunar ve kullan\u0131m\u0131 kolayd\u0131r.<\/li>\n<li><strong>H\u0131zl\u0131 ve Kolay:<\/strong> Parola s\u0131f\u0131rlama i\u015flemi, genellikle birka\u00e7 t\u0131klama ile ger\u00e7ekle\u015ftirilebilir.<\/li>\n<li><strong>Teknik Bilgi Gerektirmez:<\/strong> Komut sat\u0131r\u0131n\u0131 veya di\u011fer teknik detaylar\u0131 bilmeyi gerektirmez.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Dezavantajlar\u0131:<\/strong>\n<ul>\n<li><strong>Kontrol Paneli Ba\u011f\u0131ml\u0131l\u0131\u011f\u0131:<\/strong> Bu y\u00f6ntem, VDS sa\u011flay\u0131c\u0131n\u0131z\u0131n bir kontrol paneli sunmas\u0131na ba\u011fl\u0131d\u0131r.<\/li>\n<li><strong>S\u0131n\u0131rl\u0131 \u00d6zellikler:<\/strong> Kontrol panelleri, genellikle sadece temel y\u00f6netim i\u015flevlerini sunar.<\/li>\n<li><strong>G\u00fcvenlik Riski:<\/strong> Kontrol panelinin g\u00fcvenli\u011fi, VDS&#8217;nizin g\u00fcvenli\u011fini etkileyebilir.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Ad\u0131m Ad\u0131m Uygulama:<\/strong><\/p>\n<ol>\n<li><strong>VDS Kontrol Paneline Giri\u015f:<\/strong> VDS sa\u011flay\u0131c\u0131n\u0131z\u0131n web sitesinden veya sa\u011flad\u0131\u011f\u0131 ba\u011flant\u0131dan VDS kontrol paneline giri\u015f yap\u0131n. Giri\u015f yapmak i\u00e7in kullan\u0131c\u0131 ad\u0131n\u0131z\u0131 ve parolan\u0131z\u0131 kullanman\u0131z gerekir.<\/li>\n<li><strong>Parola S\u0131f\u0131rlama Se\u00e7ene\u011fini Bulma:<\/strong> Kontrol panelinde, genellikle &#8220;Parola&#8221;, &#8220;G\u00fcvenlik&#8221; veya &#8220;Y\u00f6netim&#8221; gibi bir b\u00f6l\u00fcmde parola s\u0131f\u0131rlama se\u00e7ene\u011fini bulabilirsiniz.<\/li>\n<li><strong>Parola S\u0131f\u0131rlama \u0130\u015flemini Ba\u015flatma:<\/strong> Parola s\u0131f\u0131rlama se\u00e7ene\u011fini t\u0131klad\u0131\u011f\u0131n\u0131zda, yeni bir parola girmeniz veya bir s\u0131f\u0131rlama ba\u011flant\u0131s\u0131 alman\u0131z istenebilir. Talimatlar\u0131 dikkatlice takip edin.<\/li>\n<li><strong>Yeni Parolay\u0131 Belirleme:<\/strong> Yeni bir parola girmeniz istenirse, g\u00fc\u00e7l\u00fc ve benzersiz bir parola se\u00e7ti\u011finizden emin olun. Parolay\u0131 iki kez girerek do\u011frulay\u0131n.<\/li>\n<li><strong>Parolay\u0131 Kaydetme:<\/strong> Yeni parolay\u0131 belirledikten sonra, de\u011fi\u015fiklikleri kaydetmek i\u00e7in &#8220;Kaydet&#8221;, &#8220;G\u00fcncelle&#8221; veya benzeri bir d\u00fc\u011fmeye t\u0131klay\u0131n.<\/li>\n<li><strong>Yeni Parola ile Giri\u015f Yapma:<\/strong> Yeni parolay\u0131 kaydettikten sonra, AlmaLinux VDS&#8217;nize SSH veya di\u011fer y\u00f6ntemlerle yeni parola ile giri\u015f yapabilirsiniz.<\/li>\n<\/ol>\n<p><strong>\u00d6zet Tablosu:<\/strong><\/p>\n<table>\n<thead>\n<tr>\n<th>Y\u00f6ntem<\/th>\n<th>Avantajlar\u0131<\/th>\n<th>Dezavantajlar\u0131<\/th>\n<th>Gereksinimler<\/th>\n<th>Zorluk Seviyesi<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>ESXi Konsolundan M\u00fcdahale<\/td>\n<td>H\u0131zl\u0131, do\u011frudan, eri\u015fim kontrol\u00fc<\/td>\n<td>ESXi eri\u015fimi gerektirir, teknik bilgi gerektirebilir, kesinti s\u00fcresi<\/td>\n<td>ESXi sunucusuna SSH veya fiziksel eri\u015fim, Linux komut bilgisi<\/td>\n<td>Orta<\/td>\n<\/tr>\n<tr>\n<td>GRUB Men\u00fcs\u00fcn\u00fc Kullanarak Parola S\u0131f\u0131rlama<\/td>\n<td>Geni\u015f uygulanabilirlik, kurtarma se\u00e7ene\u011fi<\/td>\n<td>GRUB bilgisi gerektirebilir, zaman al\u0131c\u0131, hata riski<\/td>\n<td>GRUB men\u00fcs\u00fcne eri\u015fim, Linux komut bilgisi<\/td>\n<td>Orta<\/td>\n<\/tr>\n<tr>\n<td>Kurtarma Modu ile Parola De\u011fi\u015ftirme<\/td>\n<td>Kapsaml\u0131 kurtarma, \u00e7e\u015fitli ara\u00e7lar<\/td>\n<td>ISO dosyas\u0131 gerektirir, daha karma\u015f\u0131k, teknik bilgi gerektirebilir<\/td>\n<td>Kurtarma ISO dosyas\u0131, ESXi datastore&#8217;una y\u00fckleme, sanal makine ayarlar\u0131n\u0131 d\u00fczenleme, Linux komut bilgisi<\/td>\n<td>Y\u00fcksek<\/td>\n<\/tr>\n<tr>\n<td>VDS Kontrol Paneli \u00dczerinden S\u0131f\u0131rlama<\/td>\n<td>Kullan\u0131c\u0131 dostu, h\u0131zl\u0131, kolay, teknik bilgi gerektirmez<\/td>\n<td>Kontrol paneli ba\u011f\u0131ml\u0131l\u0131\u011f\u0131, s\u0131n\u0131rl\u0131 \u00f6zellikler, g\u00fcvenlik riski<\/td>\n<td>VDS sa\u011flay\u0131c\u0131s\u0131n\u0131n kontrol paneline eri\u015fim<\/td>\n<td>D\u00fc\u015f\u00fck<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Bu b\u00f6l\u00fcmde, ESXi \u00fczerinde bir AlmaLinux VDS ortam\u0131nda root parolas\u0131n\u0131 s\u0131f\u0131rlaman\u0131n en temel y\u00f6ntemlerini detayl\u0131 bir \u015fekilde inceledik. Hangi y\u00f6ntemin sizin i\u00e7in en uygun oldu\u011funa karar verirken, eri\u015fim seviyenizi, teknik bilginizi ve VDS sa\u011flay\u0131c\u0131n\u0131z\u0131n sundu\u011fu imkanlar\u0131 g\u00f6z \u00f6n\u00fcnde bulundurun. Her bir y\u00f6ntemin ad\u0131m ad\u0131m uygulama ad\u0131mlar\u0131n\u0131 dikkatlice takip ederek, root parolas\u0131n\u0131 g\u00fcvenli bir \u015fekilde s\u0131f\u0131rlayabilirsiniz. Unutmay\u0131n, root parolas\u0131n\u0131n g\u00fcvenli\u011fi, t\u00fcm sistemin g\u00fcvenli\u011fiyle e\u015fde\u011ferdir. Bu nedenle, g\u00fc\u00e7l\u00fc ve benzersiz bir parola se\u00e7ti\u011finizden ve parolay\u0131 g\u00fcvenli bir yerde saklad\u0131\u011f\u0131n\u0131zdan emin olun.<\/p>\n<h2 id=\"3-ad-m-ad-m-grub-men-s-ile-almalinux-vds-root-parolas-n-s-f-rlama\"><span class=\"ez-toc-section\" id=\"3_Adim_Adim_GRUB_Menusu_ile_AlmaLinux_VDS_Root_Parolasini_Sifirlama\"><\/span>3. Ad\u0131m Ad\u0131m: GRUB Men\u00fcs\u00fc ile AlmaLinux VDS Root Parolas\u0131n\u0131 S\u0131f\u0131rlama<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>GRUB men\u00fcs\u00fc ile AlmaLinux VDS root parolas\u0131n\u0131 s\u0131f\u0131rlama i\u015flemi, ESXi ortam\u0131nda \u00e7al\u0131\u015fan sanal sunucunuza eri\u015fim kaybetti\u011finizde ba\u015fvurabilece\u011finiz g\u00fcvenilir ve etkili bir y\u00f6ntemdir. Bu y\u00f6ntem, ESXi konsoluna do\u011frudan eri\u015fiminiz olmasa dahi, sanal sunucunuzun \u00e7ekirdek ba\u015flatma parametrelerini de\u011fi\u015ftirerek sistemi tek kullan\u0131c\u0131 modunda ba\u015flatman\u0131za ve root parolas\u0131n\u0131 s\u0131f\u0131rlaman\u0131za olanak tan\u0131r. Bu b\u00f6l\u00fcmde, GRUB men\u00fcs\u00fcn\u00fc kullanarak AlmaLinux VDS root parolas\u0131n\u0131 s\u0131f\u0131rlama i\u015flemini ad\u0131m ad\u0131m, detayl\u0131 ve anla\u015f\u0131l\u0131r bir \u015fekilde ele alaca\u011f\u0131z.<\/p>\n<p><strong>3.1 VDS&#8217;yi Yeniden Ba\u015flatma ve GRUB Men\u00fcs\u00fcne Giri\u015f<\/strong><\/p>\n<p>GRUB men\u00fcs\u00fc ile root parolas\u0131n\u0131 s\u0131f\u0131rlama i\u015flemine ba\u015flamak i\u00e7in \u00f6ncelikle AlmaLinux VDS&#8217;nizi yeniden ba\u015flatman\u0131z gerekmektedir. Bu i\u015flem, ESXi aray\u00fcz\u00fc (vSphere Client veya vSphere Web Client) \u00fczerinden kolayca ger\u00e7ekle\u015ftirilebilir.<\/p>\n<ol>\n<li><strong>ESXi Aray\u00fcz\u00fcne Giri\u015f:<\/strong> Web taray\u0131c\u0131n\u0131z arac\u0131l\u0131\u011f\u0131yla ESXi sunucunuzun IP adresine veya hostname&#8217;ine giderek ESXi aray\u00fcz\u00fcne giri\u015f yap\u0131n.<\/li>\n<li><strong>Sanal Makine Listesini G\u00f6r\u00fcnt\u00fcleme:<\/strong> Giri\u015f yapt\u0131ktan sonra, sanal makinelerin listesini g\u00f6r\u00fcnt\u00fcleyin. Bu liste, ESXi sunucunuz \u00fczerinde \u00e7al\u0131\u015fan t\u00fcm sanal makineleri i\u00e7erecektir.<\/li>\n<li><strong>AlmaLinux VDS&#8217;nizi Se\u00e7me:<\/strong> Listedeki sanal makineler aras\u0131ndan AlmaLinux VDS&#8217;nizi bulun ve se\u00e7in. Sanal makinenin ad\u0131n\u0131 veya i\u015fletim sistemini kullanarak do\u011fru sanal makineyi belirleyebilirsiniz.<\/li>\n<li><strong>Sanal Makine G\u00fc\u00e7 Se\u00e7enekleri:<\/strong> AlmaLinux VDS&#8217;nizi se\u00e7tikten sonra, sanal makinenin g\u00fc\u00e7 se\u00e7eneklerini g\u00f6r\u00fcnt\u00fcleyin. Bu se\u00e7enekler genellikle &#8220;G\u00fc\u00e7&#8221;, &#8220;Yeniden Ba\u015flat&#8221;, &#8220;Kapat&#8221; gibi komutlar\u0131 i\u00e7erir.<\/li>\n<li><strong>Sanal Makineyi Yeniden Ba\u015flatma:<\/strong> &#8220;Yeniden Ba\u015flat&#8221; se\u00e7ene\u011fini t\u0131klayarak AlmaLinux VDS&#8217;nizi yeniden ba\u015flat\u0131n. Bu i\u015flem, sanal makinenin kapanmas\u0131na ve tekrar a\u00e7\u0131lmas\u0131na neden olacakt\u0131r.<\/li>\n<li><strong>GRUB Men\u00fcs\u00fcne Eri\u015fme:<\/strong> Sanal makine yeniden ba\u015flat\u0131l\u0131rken, GRUB men\u00fcs\u00fcne eri\u015fmek i\u00e7in do\u011fru zamanlama \u00f6nemlidir. GRUB men\u00fcs\u00fc, sistemin ba\u015flang\u0131c\u0131nda k\u0131sa bir s\u00fcre i\u00e7in g\u00f6r\u00fcnt\u00fclenir ve bu s\u00fcre i\u00e7inde klavyenizdeki belirli bir tu\u015fa basarak men\u00fcye eri\u015febilirsiniz.\n<ul>\n<li><strong>Esc Tu\u015fu:<\/strong> \u00c7o\u011fu sistemde, GRUB men\u00fcs\u00fcne eri\u015fmek i\u00e7in sanal makine yeniden ba\u015flat\u0131l\u0131rken s\u00fcrekli olarak <strong>Esc<\/strong> tu\u015funa basmak yeterlidir.<\/li>\n<li><strong>Shift Tu\u015fu:<\/strong> Baz\u0131 sistemlerde, \u00f6zellikle UEFI tabanl\u0131 sistemlerde, GRUB men\u00fcs\u00fcne eri\u015fmek i\u00e7in sol <strong>Shift<\/strong> tu\u015funa bas\u0131l\u0131 tutman\u0131z gerekebilir.<\/li>\n<li><strong>F2 veya F12 Tu\u015flar\u0131:<\/strong> Nadir durumlarda, sistemin BIOS ayarlar\u0131nda belirli bir tu\u015f (\u00f6rne\u011fin, F2 veya F12) GRUB men\u00fcs\u00fcne eri\u015fim i\u00e7in yap\u0131land\u0131r\u0131lm\u0131\u015f olabilir.<\/li>\n<\/ul>\n<p><strong>\u00d6nemli Not:<\/strong> GRUB men\u00fcs\u00fcne eri\u015fmek i\u00e7in do\u011fru tu\u015fa ve do\u011fru zamanlamaya dikkat edin. E\u011fer GRUB men\u00fcs\u00fcne eri\u015fmeyi ba\u015far\u0131rsan\u0131z, a\u015fa\u011f\u0131daki gibi bir ekranla kar\u015f\u0131la\u015facaks\u0131n\u0131z:<\/p>\n<pre><code><span class=\"hljs-selector-tag\">GNU<\/span> <span class=\"hljs-selector-tag\">GRUB<\/span> <span class=\"hljs-selector-tag\">version<\/span> 2<span class=\"hljs-selector-class\">.02<\/span>\r\n\r\n*<span class=\"hljs-selector-tag\">AlmaLinux<\/span> (4<span class=\"hljs-selector-class\">.18<\/span><span class=\"hljs-selector-class\">.0-305<\/span><span class=\"hljs-selector-class\">.el8<\/span><span class=\"hljs-selector-class\">.x86_64<\/span>) \r\n<span class=\"hljs-selector-tag\">Advanced<\/span> <span class=\"hljs-selector-tag\">options<\/span> <span class=\"hljs-selector-tag\">for<\/span> <span class=\"hljs-selector-tag\">AlmaLinux<\/span>\r\n<\/code><\/pre>\n<p>E\u011fer GRUB men\u00fcs\u00fc g\u00f6r\u00fcnt\u00fclenmezse, sanal makine do\u011frudan i\u015fletim sistemini ba\u015flatacakt\u0131r. Bu durumda, sanal makineyi tekrar yeniden ba\u015flatman\u0131z ve GRUB men\u00fcs\u00fcne eri\u015fmek i\u00e7in do\u011fru tu\u015fa basmaya devam etmeniz gerekecektir.<\/li>\n<\/ol>\n<p><strong>3.2 GRUB Men\u00fcs\u00fcnde D\u00fczenleme Moduna Ge\u00e7me<\/strong><\/p>\n<p>GRUB men\u00fcs\u00fcne eri\u015fmeyi ba\u015fard\u0131ktan sonra, root parolas\u0131n\u0131 s\u0131f\u0131rlamak i\u00e7in \u00e7ekirdek ba\u015flatma parametrelerini de\u011fi\u015ftirmeniz gerekmektedir. Bu i\u015flemi ger\u00e7ekle\u015ftirmek i\u00e7in GRUB men\u00fcs\u00fcnde d\u00fczenleme moduna ge\u00e7meniz gerekir.<\/p>\n<ol>\n<li><strong>AlmaLinux Se\u00e7ene\u011fini Se\u00e7me:<\/strong> GRUB men\u00fcs\u00fcnde, AlmaLinux i\u015fletim sistemini temsil eden sat\u0131r\u0131 (\u00f6rne\u011fin, &#8220;<em>AlmaLinux (4.18.0-305.el8.x86_64)<\/em>&#8220;) se\u00e7in. Bu sat\u0131r, sistemin ba\u015flat\u0131lacak olan \u00e7ekirde\u011fini belirtir.<\/li>\n<li><strong>D\u00fczenleme Moduna Ge\u00e7me:<\/strong> AlmaLinux se\u00e7ene\u011fi se\u00e7iliyken, klavyenizdeki <strong>e<\/strong> tu\u015funa bas\u0131n. Bu i\u015flem, GRUB yap\u0131land\u0131rma dosyas\u0131n\u0131 d\u00fczenleme modunda a\u00e7acakt\u0131r. D\u00fczenleme modunda, se\u00e7ilen \u00e7ekirde\u011fin ba\u015flatma parametrelerini g\u00f6r\u00fcnt\u00fcleyebilir ve de\u011fi\u015ftirebilirsiniz.\n<p><strong>\u00d6nemli Not:<\/strong> D\u00fczenleme moduna ge\u00e7mek i\u00e7in do\u011fru tu\u015fa (genellikle <strong>e<\/strong> tu\u015fu) basman\u0131z \u00f6nemlidir. E\u011fer yanl\u0131\u015f bir tu\u015fa basarsan\u0131z, GRUB men\u00fcs\u00fcnden \u00e7\u0131kabilir veya farkl\u0131 bir se\u00e7ene\u011fi ba\u015flatabilirsiniz.<\/li>\n<\/ol>\n<p><strong>3.3 <code>linux<\/code> Sat\u0131r\u0131na <code>rd.break enforcing=0<\/code> Parametresini Ekleme<\/strong><\/p>\n<p>GRUB d\u00fczenleme moduna girdikten sonra, root parolas\u0131n\u0131 s\u0131f\u0131rlamak i\u00e7in \u00e7ekirdek ba\u015flatma parametrelerini de\u011fi\u015ftirmeniz gerekmektedir. Bu i\u015flem, <code>linux<\/code> veya <code>linux16<\/code> ile ba\u015flayan sat\u0131ra belirli bir parametre ekleyerek ger\u00e7ekle\u015ftirilir.<\/p>\n<ol>\n<li><strong><code>linux<\/code> Sat\u0131r\u0131n\u0131 Bulma:<\/strong> GRUB d\u00fczenleme ekran\u0131nda, <code>linux<\/code> veya <code>linux16<\/code> ile ba\u015flayan bir sat\u0131r bulun. Bu sat\u0131r, \u00e7ekirdek ba\u015flatma parametrelerini i\u00e7erir ve genellikle <code>root=<\/code>, <code>ro<\/code>, <code>rhgb<\/code>, <code>quiet<\/code> gibi parametreleri i\u00e7erir.\n<p><strong>\u00d6rnek:<\/strong><\/p>\n<pre><code>linux <span class=\"hljs-regexp\">\/boot\/<\/span>vmlinuz-<span class=\"hljs-number\">4.18<\/span>.<span class=\"hljs-number\">0<\/span>-<span class=\"hljs-number\">305<\/span>.el8.x86_64 root=<span class=\"hljs-regexp\">\/dev\/m<\/span>apper<span class=\"hljs-regexp\">\/almalinux-root ro crashkernel=auto resume=\/<\/span>dev<span class=\"hljs-regexp\">\/mapper\/<\/span>almalinux-swap rhgb quiet\r\n<\/code><\/pre>\n<\/li>\n<li><strong>Parametreyi Ekleme:<\/strong> Buldu\u011funuz <code>linux<\/code> sat\u0131r\u0131n\u0131n sonuna <code>rd.break enforcing=0<\/code> parametresini ekleyin. Bu parametre, sistemin ba\u015flang\u0131c\u0131nda k\u00f6k dosya sistemini (root filesystem) okuma\/yazma modunda (read-write mode) yeniden monte etmenizi ve SELinux g\u00fcvenlik politikas\u0131n\u0131 devre d\u0131\u015f\u0131 b\u0131rakman\u0131z\u0131 sa\u011flar.\n<ul>\n<li><strong><code>rd.break<\/code>:<\/strong> Bu parametre, sistemin ba\u015flang\u0131c\u0131nda initramfs (initial RAM filesystem) a\u015famas\u0131nda bir kesme noktas\u0131 olu\u015fturur. Bu kesme noktas\u0131, k\u00f6k dosya sistemine eri\u015fmeden \u00f6nce size bir kabuk (shell) ortam\u0131 sa\u011flar.<\/li>\n<li><strong><code>enforcing=0<\/code>:<\/strong> Bu parametre, SELinux g\u00fcvenlik politikas\u0131n\u0131 devre d\u0131\u015f\u0131 b\u0131rak\u0131r. SELinux, Linux sistemlerinde g\u00fcvenlik politikalar\u0131n\u0131 uygulamak i\u00e7in kullan\u0131lan bir g\u00fcvenlik mod\u00fcl\u00fcd\u00fcr. SELinux&#8217;u devre d\u0131\u015f\u0131 b\u0131rakmak, k\u00f6k dosya sistemine eri\u015fimi kolayla\u015ft\u0131r\u0131r ve parola s\u0131f\u0131rlama i\u015flemini basitle\u015ftirir.<\/li>\n<\/ul>\n<p><strong>\u00d6rnek:<\/strong><\/p>\n<pre><code>linux <span class=\"hljs-regexp\">\/boot\/<\/span>vmlinuz-<span class=\"hljs-number\">4.18<\/span>.<span class=\"hljs-number\">0<\/span>-<span class=\"hljs-number\">305<\/span>.el8.x86_64 root=<span class=\"hljs-regexp\">\/dev\/m<\/span>apper<span class=\"hljs-regexp\">\/almalinux-root ro crashkernel=auto resume=\/<\/span>dev<span class=\"hljs-regexp\">\/mapper\/<\/span>almalinux-swap rhgb quiet rd.<span class=\"hljs-keyword\">break<\/span> enforcing=<span class=\"hljs-number\">0<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li><strong>Parametre Ekleme Konumu:<\/strong> <code>rd.break enforcing=0<\/code> parametresini <code>linux<\/code> sat\u0131r\u0131n\u0131n sonuna ekledi\u011finizden emin olun. Parametreyi yanl\u0131\u015f bir konuma eklemek, sistemin ba\u015flat\u0131lamamas\u0131na neden olabilir.<\/li>\n<\/ol>\n<p><strong>3.4 Sistem Dosyalar\u0131n\u0131 Okuma\/Yazma Modunda Yeniden Montajlama (<code>mount -o remount,rw \/sysroot<\/code>)<\/strong><\/p>\n<p><code>rd.break enforcing=0<\/code> parametresini ekleyerek sistemi ba\u015flatt\u0131ktan sonra, k\u00f6k dosya sistemini okuma\/yazma modunda yeniden monte etmeniz gerekmektedir. Bu i\u015flem, sisteme de\u011fi\u015fiklik yapabilmeniz ve root parolas\u0131n\u0131 s\u0131f\u0131rlayabilmeniz i\u00e7in gereklidir.<\/p>\n<ol>\n<li><strong>Tek Kullan\u0131c\u0131 Modunda Ba\u015flatma:<\/strong> <code>rd.break enforcing=0<\/code> parametresini ekleyerek sistemi ba\u015flatt\u0131\u011f\u0131n\u0131zda, sistem tek kullan\u0131c\u0131 modunda (single-user mode) ba\u015flat\u0131lacakt\u0131r. Tek kullan\u0131c\u0131 modu, sistemin minimum say\u0131da hizmetle ba\u015flat\u0131ld\u0131\u011f\u0131 ve genellikle sistem y\u00f6neticisi taraf\u0131ndan sistem sorunlar\u0131n\u0131 gidermek veya kurtarma i\u015flemleri yapmak i\u00e7in kullan\u0131lan bir ortamd\u0131r.<\/li>\n<li><strong>K\u00f6k Dosya Sistemini Bulma:<\/strong> Tek kullan\u0131c\u0131 modunda, k\u00f6k dosya sistemini bulman\u0131z ve montajlaman\u0131z gerekmektedir. K\u00f6k dosya sistemi, sistemin temel dosyalar\u0131n\u0131 ve dizinlerini i\u00e7eren dosya sistemidir.\n<ul>\n<li><strong><code>\/sysroot<\/code> Dizini:<\/strong> <code>rd.break<\/code> parametresi kullan\u0131ld\u0131\u011f\u0131nda, k\u00f6k dosya sistemi genellikle <code>\/sysroot<\/code> dizinine monte edilir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>K\u00f6k Dosya Sistemini Yeniden Montajlama:<\/strong> K\u00f6k dosya sistemini okuma\/yazma modunda yeniden monte etmek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">mount<\/span> -o remount,rw \/sysroot\r\n<\/code><\/pre>\n<ul>\n<li><strong><code>mount<\/code>:<\/strong> Bu komut, dosya sistemlerini monte etmek i\u00e7in kullan\u0131lan bir Linux komutudur.<\/li>\n<li><strong><code>-o remount,rw<\/code>:<\/strong> Bu se\u00e7enek, mevcut bir dosya sistemini yeniden monte etmenizi ve okuma\/yazma modunda (read-write mode) monte etmenizi sa\u011flar.<\/li>\n<li><strong><code>\/sysroot<\/code>:<\/strong> Bu, k\u00f6k dosya sisteminin monte edildi\u011fi dizindir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Hata Mesajlar\u0131n\u0131 Kontrol Etme:<\/strong> K\u00f6k dosya sistemini yeniden monte ederken herhangi bir hata mesaj\u0131 al\u0131rsan\u0131z, sorunu gidermeden i\u015fleme devam etmeyin. Hata mesajlar\u0131, dosya sisteminde bir sorun oldu\u011funu veya komutun do\u011fru \u015fekilde \u00e7al\u0131\u015fmad\u0131\u011f\u0131n\u0131 g\u00f6sterebilir.<\/li>\n<\/ol>\n<p><strong>3.5 <code>chroot \/sysroot<\/code> Komutu ile K\u00f6k Dizine Ge\u00e7me<\/strong><\/p>\n<p>K\u00f6k dosya sistemini okuma\/yazma modunda yeniden monte ettikten sonra, <code>chroot<\/code> komutunu kullanarak k\u00f6k dizine ge\u00e7meniz gerekmektedir. Bu i\u015flem, sisteme de\u011fi\u015fiklik yapabilmeniz ve root parolas\u0131n\u0131 s\u0131f\u0131rlayabilmeniz i\u00e7in gereklidir.<\/p>\n<ol>\n<li><strong><code>chroot<\/code> Komutu:<\/strong> <code>chroot<\/code> komutu, mevcut i\u015flem i\u00e7in k\u00f6k dizinini de\u011fi\u015ftirmenizi sa\u011flar. Bu, sistemin geri kalan\u0131ndan izole edilmi\u015f bir ortamda \u00e7al\u0131\u015fman\u0131z\u0131 sa\u011flar.<\/li>\n<li><strong>K\u00f6k Dizine Ge\u00e7me:<\/strong> K\u00f6k dizine ge\u00e7mek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">chroot<\/span> \/sysroot\r\n<\/code><\/pre>\n<p>Bu komut, mevcut kabu\u011funuzun (shell) k\u00f6k dizinini <code>\/sysroot<\/code> olarak de\u011fi\u015ftirecektir. Art\u0131k, sistemin ger\u00e7ek k\u00f6k dizinindeymi\u015f gibi komutlar \u00e7al\u0131\u015ft\u0131rabilirsiniz.<\/li>\n<li><strong>Komut \u0130stemi De\u011fi\u015fikli\u011fi:<\/strong> <code>chroot<\/code> komutunu \u00e7al\u0131\u015ft\u0131rd\u0131ktan sonra, komut isteminiz de\u011fi\u015febilir. Bu, k\u00f6k dizinin ba\u015far\u0131yla de\u011fi\u015ftirildi\u011fini g\u00f6sterir.<\/li>\n<\/ol>\n<p><strong>3.6 <code>passwd<\/code> Komutu ile Yeni Root Parolas\u0131n\u0131 Belirleme<\/strong><\/p>\n<p>K\u00f6k dizine ge\u00e7tikten sonra, art\u0131k root parolas\u0131n\u0131 s\u0131f\u0131rlayabilirsiniz. Bu i\u015flem, <code>passwd<\/code> komutu kullan\u0131larak ger\u00e7ekle\u015ftirilir.<\/p>\n<ol>\n<li><strong><code>passwd<\/code> Komutu:<\/strong> <code>passwd<\/code> komutu, kullan\u0131c\u0131 parolalar\u0131n\u0131 de\u011fi\u015ftirmek i\u00e7in kullan\u0131lan bir Linux komutudur.<\/li>\n<li><strong>Root Parolas\u0131n\u0131 De\u011fi\u015ftirme:<\/strong> Root parolas\u0131n\u0131 de\u011fi\u015ftirmek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">passwd<\/span>\r\n<\/code><\/pre>\n<p>Bu komutu \u00e7al\u0131\u015ft\u0131rd\u0131\u011f\u0131n\u0131zda, sistem sizden yeni bir root parolas\u0131 girmenizi isteyecektir.<\/li>\n<li><strong>G\u00fc\u00e7l\u00fc Bir Parola Se\u00e7me:<\/strong> Yeni root parolas\u0131 se\u00e7erken, g\u00fc\u00e7l\u00fc ve benzersiz bir parola se\u00e7ti\u011finizden emin olun. G\u00fc\u00e7l\u00fc bir parola, a\u015fa\u011f\u0131daki \u00f6zelliklere sahip olmal\u0131d\u0131r:\n<ul>\n<li><strong>Uzunluk:<\/strong> En az 12 karakter uzunlu\u011funda olmal\u0131d\u0131r.<\/li>\n<li><strong>Karma\u015f\u0131kl\u0131k:<\/strong> B\u00fcy\u00fck harfler, k\u00fc\u00e7\u00fck harfler, rakamlar ve semboller i\u00e7ermelidir.<\/li>\n<li><strong>Tahmin Edilebilirlik:<\/strong> S\u00f6zl\u00fck kelimeleri, do\u011fum tarihleri veya kolayca tahmin edilebilecek di\u011fer bilgiler i\u00e7ermemelidir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Parolay\u0131 Do\u011frulama:<\/strong> Yeni parolay\u0131 girdikten sonra, sistem sizden parolay\u0131 tekrar girerek do\u011frulaman\u0131z\u0131 isteyecektir. Parolay\u0131 do\u011fru girdi\u011finizden emin olun.<\/li>\n<li><strong>Parola Ba\u015far\u0131yla De\u011fi\u015ftirildi Mesaj\u0131:<\/strong> Parola ba\u015far\u0131yla de\u011fi\u015ftirildikten sonra, sistem size bir &#8220;parola ba\u015far\u0131yla de\u011fi\u015ftirildi&#8221; mesaj\u0131 g\u00f6sterecektir.<\/li>\n<\/ol>\n<p><strong>3.7 SELinux Etiketlerini G\u00fcncelleme (<code>touch \/.autorelabel<\/code>)<\/strong><\/p>\n<p>SELinux, Linux sistemlerinde g\u00fcvenlik politikalar\u0131n\u0131 uygulamak i\u00e7in kullan\u0131lan bir g\u00fcvenlik mod\u00fcl\u00fcd\u00fcr. <code>enforcing=0<\/code> parametresi ile SELinux&#8217;u devre d\u0131\u015f\u0131 b\u0131rakt\u0131ysan\u0131z, sistemi yeniden ba\u015flatt\u0131ktan sonra SELinux etiketlerini g\u00fcncellemeniz gerekmektedir. Bu i\u015flem, sistemin do\u011fru g\u00fcvenlik politikalar\u0131yla \u00e7al\u0131\u015fmas\u0131n\u0131 sa\u011flar.<\/p>\n<ol>\n<li><strong>SELinux Etiketlerini G\u00fcncelleme:<\/strong> SELinux etiketlerini g\u00fcncellemek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">touch<\/span> \/.autorelabel\r\n<\/code><\/pre>\n<ul>\n<li><strong><code>touch<\/code>:<\/strong> Bu komut, bir dosyan\u0131n olu\u015fturulma veya de\u011fi\u015ftirilme tarihini g\u00fcncellemek i\u00e7in kullan\u0131lan bir Linux komutudur.<\/li>\n<li><strong><code>\/.autorelabel<\/code>:<\/strong> Bu dosya, sistemin yeniden ba\u015flat\u0131lmas\u0131ndan sonra SELinux etiketlerini otomatik olarak g\u00fcncellemesini tetikler.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Dosyan\u0131n Olu\u015fturulmas\u0131:<\/strong> <code>touch \/.autorelabel<\/code> komutunu \u00e7al\u0131\u015ft\u0131rd\u0131\u011f\u0131n\u0131zda, <code>\/<\/code> dizininde <code>.autorelabel<\/code> ad\u0131nda bir dosya olu\u015fturulacakt\u0131r. Bu dosya, sistemin yeniden ba\u015flat\u0131lmas\u0131ndan sonra SELinux etiketlerini otomatik olarak g\u00fcncellemesini sa\u011flayacakt\u0131r.<\/li>\n<\/ol>\n<p><strong>3.8 Sistemi Yeniden Ba\u015flatma ve Yeni Parola ile Giri\u015f<\/strong><\/p>\n<p>Root parolas\u0131n\u0131 s\u0131f\u0131rlad\u0131ktan ve SELinux etiketlerini g\u00fcncelledikten sonra, sistemi yeniden ba\u015flatabilirsiniz. Yeniden ba\u015flatma i\u015fleminden sonra, yeni root parolan\u0131z ile sisteme giri\u015f yapabileceksiniz.<\/p>\n<ol>\n<li><strong>Sistemden \u00c7\u0131k\u0131\u015f:<\/strong> K\u00f6k dizinden \u00e7\u0131kmak i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">exit<\/span>\r\n<\/code><\/pre>\n<p>Bu komut, <code>chroot<\/code> ortam\u0131ndan \u00e7\u0131kacak ve orijinal kabu\u011funuza geri d\u00f6neceksiniz.<\/li>\n<li><strong>Tek Kullan\u0131c\u0131 Modundan \u00c7\u0131k\u0131\u015f:<\/strong> Tek kullan\u0131c\u0131 modundan \u00e7\u0131kmak i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">exit<\/span>\r\n<\/code><\/pre>\n<p>Bu komut, tek kullan\u0131c\u0131 modundan \u00e7\u0131kacak ve sisteme yeniden ba\u015flatma sinyali g\u00f6nderecektir.<\/li>\n<li><strong>Sistemi Yeniden Ba\u015flatma:<\/strong> Sistem otomatik olarak yeniden ba\u015flat\u0131lacakt\u0131r. E\u011fer sistem otomatik olarak yeniden ba\u015flat\u0131lmazsa, a\u015fa\u011f\u0131daki komutu kullanarak sistemi manuel olarak yeniden ba\u015flatabilirsiniz:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">reboot<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li><strong>Yeni Parola ile Giri\u015f Yapma:<\/strong> Sistem yeniden ba\u015flat\u0131ld\u0131ktan sonra, konsol veya SSH arac\u0131l\u0131\u011f\u0131yla sisteme giri\u015f yapmay\u0131 deneyin. Giri\u015f yaparken, az \u00f6nce belirledi\u011finiz yeni root parolas\u0131n\u0131 kullan\u0131n.<\/li>\n<li><strong>Ba\u015far\u0131l\u0131 Giri\u015f:<\/strong> E\u011fer yeni parolay\u0131 do\u011fru girdiyseniz, sisteme ba\u015far\u0131l\u0131 bir \u015fekilde giri\u015f yapabileceksiniz.<\/li>\n<\/ol>\n<p><strong>\u00d6zet:<\/strong><\/p>\n<p>GRUB men\u00fcs\u00fc ile AlmaLinux VDS root parolas\u0131n\u0131 s\u0131f\u0131rlama i\u015flemi, a\u015fa\u011f\u0131daki ad\u0131mlar\u0131 i\u00e7erir:<\/p>\n<ol>\n<li>VDS&#8217;yi Yeniden Ba\u015flatma ve GRUB Men\u00fcs\u00fcne Giri\u015f<\/li>\n<li>GRUB Men\u00fcs\u00fcnde D\u00fczenleme Moduna Ge\u00e7me<\/li>\n<li><code>linux<\/code> Sat\u0131r\u0131na <code>rd.break enforcing=0<\/code> Parametresini Ekleme<\/li>\n<li>Sistem Dosyalar\u0131n\u0131 Okuma\/Yazma Modunda Yeniden Montajlama (<code>mount -o remount,rw \/sysroot<\/code>)<\/li>\n<li><code>chroot \/sysroot<\/code> Komutu ile K\u00f6k Dizine Ge\u00e7me<\/li>\n<li><code>passwd<\/code> Komutu ile Yeni Root Parolas\u0131n\u0131 Belirleme<\/li>\n<li>SELinux Etiketlerini G\u00fcncelleme (<code>touch \/.autorelabel<\/code>)<\/li>\n<li>Sistemi Yeniden Ba\u015flatma ve Yeni Parola ile Giri\u015f<\/li>\n<\/ol>\n<p>Bu ad\u0131mlar\u0131 dikkatlice takip ederek, AlmaLinux VDS&#8217;nizin root parolas\u0131n\u0131 ba\u015far\u0131yla s\u0131f\u0131rlayabilir ve sisteme eri\u015fiminizi yeniden sa\u011flayabilirsiniz. Unutmay\u0131n, root parolas\u0131n\u0131n g\u00fcvenli\u011fi, t\u00fcm sistemin g\u00fcvenli\u011fiyle e\u015fde\u011ferdir. Bu nedenle, g\u00fc\u00e7l\u00fc ve benzersiz bir parola se\u00e7ti\u011finizden ve parolay\u0131 g\u00fcvenli bir yerde saklad\u0131\u011f\u0131n\u0131zdan emin olun.<\/p>\n<p><strong>Ek Bilgiler ve \u0130pu\u00e7lar\u0131:<\/strong><\/p>\n<ul>\n<li><strong>GRUB Men\u00fcs\u00fc Zaman A\u015f\u0131m\u0131:<\/strong> GRUB men\u00fcs\u00fc, k\u0131sa bir s\u00fcre sonra otomatik olarak varsay\u0131lan se\u00e7ene\u011fi ba\u015flat\u0131r. Bu zaman a\u015f\u0131m\u0131n\u0131 de\u011fi\u015ftirmek i\u00e7in, <code>\/etc\/default\/grub<\/code> dosyas\u0131n\u0131 d\u00fczenleyebilir ve <code>GRUB_TIMEOUT<\/code> de\u011fi\u015fkenini istedi\u011finiz saniye say\u0131s\u0131na ayarlayabilirsiniz.<\/li>\n<li><strong>GRUB Parolas\u0131:<\/strong> GRUB men\u00fcs\u00fcne yetkisiz eri\u015fimi engellemek i\u00e7in bir parola ayarlayabilirsiniz. Bu, <code>\/boot\/grub\/grub.cfg<\/code> dosyas\u0131n\u0131 d\u00fczenleyerek veya <code>grub-mkpasswd-pbkdf2<\/code> komutunu kullanarak yap\u0131labilir.<\/li>\n<li><strong>Kurtarma Modu:<\/strong> E\u011fer GRUB men\u00fcs\u00fcne eri\u015femiyorsan\u0131z veya sistem ba\u015flatma sorunlar\u0131 ya\u015f\u0131yorsan\u0131z, kurtarma modunu kullanmay\u0131 d\u00fc\u015f\u00fcnebilirsiniz. Kurtarma modu, sistemin temel i\u015flevlerini onarmak veya kurtarmak i\u00e7in \u00e7e\u015fitli ara\u00e7lar sunar.<\/li>\n<li><strong>Yedekleme:<\/strong> Herhangi bir sistem de\u011fi\u015fikli\u011fi yapmadan \u00f6nce, \u00f6nemli verilerinizi yedeklemeniz \u00f6nemlidir. Bu, veri kayb\u0131 durumunda verilerinizi kurtarman\u0131za olanak tan\u0131r.<\/li>\n<\/ul>\n<p>Bu rehber, &#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221; ba\u015fl\u0131\u011f\u0131 alt\u0131nda, GRUB men\u00fcs\u00fcn\u00fc kullanarak AlmaLinux VDS root parolas\u0131n\u0131 s\u0131f\u0131rlama i\u015flemini detayl\u0131 bir \u015fekilde a\u00e7\u0131klamaktad\u0131r. Bu bilgiler, ESXi ortam\u0131nda \u00e7al\u0131\u015fan AlmaLinux VDS&#8217;nizin root parolas\u0131n\u0131 kaybetti\u011finizde veya unutman\u0131z durumunda size yard\u0131mc\u0131 olacakt\u0131r.<\/p>\n<h2 id=\"4-esxi-konsolundan-do-rudan-eri-im-ile-root-parolas-n-s-f-rlama\"><span class=\"ez-toc-section\" id=\"4_ESXi_Konsolundan_Dogrudan_Erisim_ile_Root_Parolasini_Sifirlama\"><\/span>4. ESXi Konsolundan Do\u011frudan Eri\u015fim ile Root Parolas\u0131n\u0131 S\u0131f\u0131rlama<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>ESXi konsolundan do\u011frudan eri\u015fim ile AlmaLinux VDS root parolas\u0131n\u0131 s\u0131f\u0131rlama, \u00f6zellikle sanal ortamlarda sistem y\u00f6neticileri i\u00e7in hayati bir beceridir. Bu y\u00f6ntem, fiziksel sunucuya veya ESXi host&#8217;una do\u011frudan eri\u015fiminiz oldu\u011funda en h\u0131zl\u0131 ve g\u00fcvenilir \u00e7\u00f6z\u00fcmlerden birini sunar. Bu b\u00f6l\u00fcmde, ESXi konsolunu kullanarak AlmaLinux VDS \u00fczerindeki root parolas\u0131n\u0131 nas\u0131l s\u0131f\u0131rlayaca\u011f\u0131n\u0131z\u0131 ad\u0131m ad\u0131m, ayr\u0131nt\u0131l\u0131 bir \u015fekilde a\u00e7\u0131klayaca\u011f\u0131z. &#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221; kapsam\u0131nda, bu y\u00f6ntem, ESXi ortam\u0131ndaki sanal makinelerin y\u00f6netiminde kritik bir rol oynamaktad\u0131r.<\/p>\n<p><strong>4.1 ESXi Sunucusuna SSH ile Ba\u011flanma (veya Konsolu Kullanma)<\/strong><\/p>\n<p>ESXi sunucusuna eri\u015fmek i\u00e7in iki temel y\u00f6ntem bulunmaktad\u0131r: SSH (Secure Shell) ile uzaktan ba\u011flanmak veya do\u011frudan ESXi host&#8217;unun konsolunu kullanmak. Hangi y\u00f6ntemin kullan\u0131laca\u011f\u0131, eri\u015fim yetkilerinize ve fiziksel eri\u015fim durumunuza ba\u011fl\u0131d\u0131r.<\/p>\n<ul>\n<li><strong>SSH ile Ba\u011flanma:<\/strong>\n<p>SSH, uzak bir sunucuya g\u00fcvenli bir \u015fekilde ba\u011flanman\u0131z\u0131 sa\u011flayan bir protokold\u00fcr. ESXi sunucusuna SSH ile ba\u011flanmak i\u00e7in, \u00f6ncelikle ESXi host&#8217;unda SSH servisinin etkinle\u015ftirilmi\u015f olmas\u0131 gerekmektedir.<\/p>\n<ol>\n<li><strong>SSH Servisini Etkinle\u015ftirme:<\/strong>\n<ul>\n<li>ESXi host&#8217;una do\u011frudan konsol arac\u0131l\u0131\u011f\u0131yla eri\u015fim sa\u011flay\u0131n.<\/li>\n<li>Konsolda, &#8220;Troubleshooting Options&#8221; b\u00f6l\u00fcm\u00fcne gidin.<\/li>\n<li>&#8220;Enable SSH&#8221; se\u00e7ene\u011fini se\u00e7in ve etkinle\u015ftirin.<\/li>\n<\/ul>\n<\/li>\n<li><strong>SSH \u0130stemcisi Kullanarak Ba\u011flanma:<\/strong>\n<ul>\n<li>Bilgisayar\u0131n\u0131zda bir SSH istemcisi (\u00f6rne\u011fin, PuTTY, OpenSSH) kullan\u0131n.<\/li>\n<li>ESXi host&#8217;unun IP adresini veya hostname&#8217;ini girin.<\/li>\n<li>Ba\u011flant\u0131 noktas\u0131 (port) olarak 22&#8217;yi kullan\u0131n (varsay\u0131lan SSH portu).<\/li>\n<li>&#8220;root&#8221; kullan\u0131c\u0131 ad\u0131 ve ESXi root parolas\u0131 ile giri\u015f yap\u0131n.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><strong>\u00d6rnek (PuTTY Kullanarak SSH Ba\u011flant\u0131s\u0131):<\/strong><\/p>\n<ul>\n<li>PuTTY uygulamas\u0131n\u0131 a\u00e7\u0131n.<\/li>\n<li>&#8220;Host Name (or IP address)&#8221; alan\u0131na ESXi sunucusunun IP adresini girin.<\/li>\n<li>&#8220;Port&#8221; alan\u0131na 22 yaz\u0131n.<\/li>\n<li>&#8220;Connection type&#8221; olarak &#8220;SSH&#8221; se\u00e7in.<\/li>\n<li>&#8220;Open&#8221; butonuna t\u0131klay\u0131n.<\/li>\n<li>A\u00e7\u0131lan konsol penceresinde &#8220;login as:&#8221; k\u0131sm\u0131na &#8220;root&#8221; yaz\u0131n ve Enter tu\u015funa bas\u0131n.<\/li>\n<li>&#8220;root@<esxi_ip_adresi>&#8216;s password:&#8221; k\u0131sm\u0131na ESXi root parolan\u0131z\u0131 girin ve Enter tu\u015funa bas\u0131n.<\/esxi_ip_adresi><\/li>\n<\/ul>\n<\/li>\n<li><strong>Do\u011frudan Konsolu Kullanma:<\/strong>\n<p>ESXi host&#8217;una fiziksel olarak eri\u015fiminiz varsa, do\u011frudan konsolu kullanmak daha basit bir se\u00e7enektir.<\/p>\n<ol>\n<li><strong>Konsola Eri\u015fim:<\/strong> ESXi host&#8217;unun ekran\u0131na ve klavyesine eri\u015fim sa\u011flay\u0131n.<\/li>\n<li><strong>Kimlik Do\u011frulama:<\/strong> &#8220;root&#8221; kullan\u0131c\u0131 ad\u0131 ve ESXi root parolas\u0131 ile giri\u015f yap\u0131n.<\/li>\n<\/ol>\n<p><strong>\u00d6nemli Not:<\/strong> ESXi root parolas\u0131n\u0131 unutman\u0131z durumunda, ESXi&#8217;yi yeniden kurman\u0131z gerekebilir. Bu nedenle, ESXi root parolan\u0131z\u0131 g\u00fcvenli bir yerde saklad\u0131\u011f\u0131n\u0131zdan emin olun.<\/li>\n<\/ul>\n<p><strong>4.2 AlmaLinux VDS&#8217;nin Sanal Makine Konsoluna Eri\u015fme<\/strong><\/p>\n<p>ESXi sunucusuna ba\u011fland\u0131ktan sonra, root parolas\u0131n\u0131 s\u0131f\u0131rlamak istedi\u011finiz AlmaLinux VDS&#8217;nin sanal makine konsoluna eri\u015fmeniz gerekmektedir. Bu i\u015flem, ESXi komut sat\u0131r\u0131ndan veya vSphere Client (veya vSphere Web Client) aray\u00fcz\u00fcnden ger\u00e7ekle\u015ftirilebilir.<\/p>\n<ul>\n<li><strong>ESXi Komut Sat\u0131r\u0131ndan Eri\u015fim:<\/strong>\n<ol>\n<li><strong>Sanal Makine ID&#8217;sini Bulma:<\/strong> ESXi komut sat\u0131r\u0131nda, \u00e7al\u0131\u015fan sanal makinelerin listesini g\u00f6r\u00fcnt\u00fclemek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\">vim-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> vmsvc\/getallvms<\/span>\r\n<\/code><\/pre>\n<p>Bu komut, \u00e7al\u0131\u015fan sanal makinelerin ID&#8217;lerini, adlar\u0131n\u0131 ve i\u015fletim sistemlerini listeleyecektir. AlmaLinux VDS&#8217;nizin ad\u0131n\u0131 bulun ve ID&#8217;sini not al\u0131n.<\/li>\n<li><strong>Sanal Makine Konsoluna Ba\u011flanma:<\/strong> AlmaLinux VDS&#8217;nizin konsoluna eri\u015fmek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n, <code>&lt;VM_ID&gt;<\/code> k\u0131sm\u0131n\u0131 not ald\u0131\u011f\u0131n\u0131z ID ile de\u011fi\u015ftirin:\n<pre><code class=\"lang-bash\">vim-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> vmsvc\/console &lt;VM_ID&gt;<\/span>\r\n<\/code><\/pre>\n<p>Bu komut, sanal makine konsolunu a\u00e7acakt\u0131r. E\u011fer konsol a\u00e7\u0131lmazsa veya ba\u015fka bir sorunla kar\u015f\u0131la\u015f\u0131rsan\u0131z, ESXi aray\u00fcz\u00fcnden sanal makine konsoluna eri\u015fmeyi deneyebilirsiniz.<\/li>\n<\/ol>\n<\/li>\n<li><strong>vSphere Client (veya vSphere Web Client) Aray\u00fcz\u00fcnden Eri\u015fim:<\/strong>\n<ol>\n<li><strong>vSphere Aray\u00fcz\u00fcne Giri\u015f:<\/strong> Web taray\u0131c\u0131n\u0131z arac\u0131l\u0131\u011f\u0131yla vSphere Client veya vSphere Web Client aray\u00fcz\u00fcne giri\u015f yap\u0131n.<\/li>\n<li><strong>Sanal Makine Listesini G\u00f6r\u00fcnt\u00fcleme:<\/strong> Giri\u015f yapt\u0131ktan sonra, sanal makinelerin listesini g\u00f6r\u00fcnt\u00fcleyin.<\/li>\n<li><strong>AlmaLinux VDS&#8217;nizi Se\u00e7me:<\/strong> Listedeki sanal makineler aras\u0131ndan AlmaLinux VDS&#8217;nizi bulun ve se\u00e7in.<\/li>\n<li><strong>Konsolu A\u00e7ma:<\/strong> Sanal makine se\u00e7ildikten sonra, &#8220;Konsol&#8221; (Console) veya &#8220;Web Konsolu&#8221; (Web Console) se\u00e7ene\u011fini t\u0131klayarak sanal makine konsolunu a\u00e7\u0131n.<\/li>\n<\/ol>\n<p><strong>\u00d6nemli Not:<\/strong> Sanal makine konsoluna eri\u015fmek i\u00e7in, vSphere aray\u00fcz\u00fcnde yeterli yetkiye sahip olman\u0131z gerekmektedir.<\/li>\n<\/ul>\n<p><strong>4.3 Tek Kullan\u0131c\u0131 Moduna Ge\u00e7me<\/strong><\/p>\n<p>AlmaLinux VDS konsoluna eri\u015fim sa\u011flad\u0131ktan sonra, root parolas\u0131n\u0131 s\u0131f\u0131rlamak i\u00e7in sistemi tek kullan\u0131c\u0131 moduna ge\u00e7irmeniz gerekmektedir. Tek kullan\u0131c\u0131 modu, sistemin minimum say\u0131da hizmetle ba\u015flat\u0131ld\u0131\u011f\u0131 ve genellikle sistem y\u00f6neticisi taraf\u0131ndan sistem sorunlar\u0131n\u0131 gidermek veya kurtarma i\u015flemleri yapmak i\u00e7in kullan\u0131lan bir ortamd\u0131r.<\/p>\n<ol>\n<li><strong>Sanal Makineyi Yeniden Ba\u015flatma:<\/strong>\n<ul>\n<li>Sanal makine konsolunda, sistemi yeniden ba\u015flatmak i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">reboot<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li>Alternatif olarak, vSphere aray\u00fcz\u00fcnden sanal makineyi yeniden ba\u015flatabilirsiniz.<\/li>\n<\/ul>\n<\/li>\n<li><strong>GRUB Men\u00fcs\u00fcne Eri\u015fme:<\/strong>\n<ul>\n<li>Sanal makine yeniden ba\u015flat\u0131l\u0131rken, GRUB men\u00fcs\u00fcne eri\u015fmek i\u00e7in klavyenizdeki <strong>Esc<\/strong> veya <strong>Shift<\/strong> tu\u015flar\u0131na bas\u0131l\u0131 tutun. Bu, GRUB men\u00fcs\u00fcn\u00fc g\u00f6r\u00fcnt\u00fcleyecektir. E\u011fer GRUB men\u00fcs\u00fc g\u00f6r\u00fcnt\u00fclenmezse, sanal makinenin BIOS ayarlar\u0131nda POST ekran\u0131nda klavye giri\u015fini etkinle\u015ftirmeniz gerekebilir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>GRUB&#8217;da D\u00fczenleme Moduna Ge\u00e7me:<\/strong>\n<ul>\n<li>GRUB men\u00fcs\u00fcnde, AlmaLinux se\u00e7ene\u011fini se\u00e7in ve <strong>e<\/strong> tu\u015funa basarak d\u00fczenleme moduna ge\u00e7in. Bu, GRUB yap\u0131land\u0131rma dosyas\u0131n\u0131 d\u00fczenlemenize olanak tan\u0131r.<\/li>\n<\/ul>\n<\/li>\n<li><strong><code>linux<\/code> Sat\u0131r\u0131n\u0131 D\u00fczenleme:<\/strong>\n<ul>\n<li>GRUB yap\u0131land\u0131rma dosyas\u0131nda, <code>linux<\/code> veya <code>linux16<\/code> ile ba\u015flayan bir sat\u0131r bulun. Bu sat\u0131r, \u00e7ekirdek ba\u015flatma parametrelerini i\u00e7erir. Bu sat\u0131r\u0131n sonuna <code>rd.break enforcing=0<\/code> parametresini ekleyin. Bu parametre, sistemin ba\u015flang\u0131c\u0131nda k\u00f6k dosya sistemini okuma\/yazma modunda yeniden monte etmenizi ve SELinux&#8217;u devre d\u0131\u015f\u0131 b\u0131rakman\u0131z\u0131 sa\u011flar.<\/li>\n<\/ul>\n<p><strong>\u00d6rnek:<\/strong><\/p>\n<pre><code>linux <span class=\"hljs-regexp\">\/boot\/<\/span>vmlinuz-<span class=\"hljs-number\">4.18<\/span>.<span class=\"hljs-number\">0<\/span>-<span class=\"hljs-number\">305<\/span>.el8.x86_64 root=<span class=\"hljs-regexp\">\/dev\/m<\/span>apper<span class=\"hljs-regexp\">\/almalinux-root ro crashkernel=auto resume=\/<\/span>dev<span class=\"hljs-regexp\">\/mapper\/<\/span>almalinux-swap rhgb quiet rd.<span class=\"hljs-keyword\">break<\/span> enforcing=<span class=\"hljs-number\">0<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li><strong>De\u011fi\u015fiklikleri Kaydetme ve Ba\u015flatma:<\/strong>\n<ul>\n<li>De\u011fi\u015fiklikleri kaydetmek ve sistemi ba\u015flatmak i\u00e7in <strong>Ctrl + X<\/strong> veya <strong>F10<\/strong> tu\u015flar\u0131na bas\u0131n. Bu, sistemi tek kullan\u0131c\u0131 modunda ba\u015flatacakt\u0131r.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><strong>4.4 Root Dosya Sistemini Yaz\u0131labilir Hale Getirme<\/strong><\/p>\n<p>Sistem tek kullan\u0131c\u0131 modunda ba\u015flat\u0131ld\u0131\u011f\u0131nda, root dosya sistemini yaz\u0131labilir hale getirmeniz gerekmektedir. Bu i\u015flem, sisteme de\u011fi\u015fiklik yapabilmeniz ve root parolas\u0131n\u0131 s\u0131f\u0131rlayabilmeniz i\u00e7in gereklidir.<\/p>\n<ol>\n<li><strong>K\u00f6k Dosya Sistemini Bulma:<\/strong>\n<ul>\n<li>Tek kullan\u0131c\u0131 modunda, k\u00f6k dosya sistemini bulman\u0131z ve montajlaman\u0131z gerekmektedir. K\u00f6k dosya sistemi, sistemin temel dosyalar\u0131n\u0131 ve dizinlerini i\u00e7eren dosya sistemidir.<\/li>\n<li><code>rd.break<\/code> parametresi kullan\u0131ld\u0131\u011f\u0131nda, k\u00f6k dosya sistemi genellikle <code>\/sysroot<\/code> dizinine monte edilir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>K\u00f6k Dosya Sistemini Yeniden Montajlama:<\/strong>\n<ul>\n<li>K\u00f6k dosya sistemini okuma\/yazma modunda yeniden monte etmek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">mount<\/span> -o remount,rw \/sysroot\r\n<\/code><\/pre>\n<ul>\n<li><strong><code>mount<\/code>:<\/strong> Bu komut, dosya sistemlerini monte etmek i\u00e7in kullan\u0131lan bir Linux komutudur.<\/li>\n<li><strong><code>-o remount,rw<\/code>:<\/strong> Bu se\u00e7enek, mevcut bir dosya sistemini yeniden monte etmenizi ve okuma\/yazma modunda (read-write mode) monte etmenizi sa\u011flar.<\/li>\n<li><strong><code>\/sysroot<\/code>:<\/strong> Bu, k\u00f6k dosya sisteminin monte edildi\u011fi dizindir.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><strong>4.5 <code>passwd<\/code> Komutu ile Root Parolas\u0131n\u0131 De\u011fi\u015ftirme<\/strong><\/p>\n<p>K\u00f6k dosya sistemi yaz\u0131labilir hale getirildikten sonra, art\u0131k root parolas\u0131n\u0131 s\u0131f\u0131rlayabilirsiniz. Bu i\u015flem, <code>passwd<\/code> komutu kullan\u0131larak ger\u00e7ekle\u015ftirilir.<\/p>\n<ol>\n<li><strong><code>chroot<\/code> ile K\u00f6k Dizine Ge\u00e7me (Gerekirse):<\/strong>\n<ul>\n<li>Baz\u0131 durumlarda, <code>passwd<\/code> komutunu \u00e7al\u0131\u015ft\u0131rmadan \u00f6nce <code>chroot<\/code> komutu ile k\u00f6k dizine ge\u00e7meniz gerekebilir.\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">chroot<\/span> \/sysroot\r\n<\/code><\/pre>\n<ul>\n<li><strong><code>chroot<\/code>:<\/strong> Bu komut, mevcut i\u015flem i\u00e7in k\u00f6k dizinini de\u011fi\u015ftirmenizi sa\u011flar.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong><code>passwd<\/code> Komutu:<\/strong>\n<ul>\n<li>Root parolas\u0131n\u0131 de\u011fi\u015ftirmek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">passwd<\/span>\r\n<\/code><\/pre>\n<p>Bu komutu \u00e7al\u0131\u015ft\u0131rd\u0131\u011f\u0131n\u0131zda, sistem sizden yeni bir root parolas\u0131 girmenizi isteyecektir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>G\u00fc\u00e7l\u00fc Bir Parola Se\u00e7me:<\/strong>\n<ul>\n<li>Yeni root parolas\u0131 se\u00e7erken, g\u00fc\u00e7l\u00fc ve benzersiz bir parola se\u00e7ti\u011finizden emin olun. G\u00fc\u00e7l\u00fc bir parola, a\u015fa\u011f\u0131daki \u00f6zelliklere sahip olmal\u0131d\u0131r:\n<ul>\n<li><strong>Uzunluk:<\/strong> En az 12 karakter uzunlu\u011funda olmal\u0131d\u0131r.<\/li>\n<li><strong>Karma\u015f\u0131kl\u0131k:<\/strong> B\u00fcy\u00fck harfler, k\u00fc\u00e7\u00fck harfler, rakamlar ve semboller i\u00e7ermelidir.<\/li>\n<li><strong>Tahmin Edilebilirlik:<\/strong> S\u00f6zl\u00fck kelimeleri, do\u011fum tarihleri veya kolayca tahmin edilebilecek di\u011fer bilgiler i\u00e7ermemelidir.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Parolay\u0131 Do\u011frulama:<\/strong>\n<ul>\n<li>Yeni parolay\u0131 girdikten sonra, sistem sizden parolay\u0131 tekrar girerek do\u011frulaman\u0131z\u0131 isteyecektir. Parolay\u0131 do\u011fru girdi\u011finizden emin olun.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Parola Ba\u015far\u0131yla De\u011fi\u015ftirildi Mesaj\u0131:<\/strong>\n<ul>\n<li>Parola ba\u015far\u0131yla de\u011fi\u015ftirildikten sonra, sistem size bir &#8220;parola ba\u015far\u0131yla de\u011fi\u015ftirildi&#8221; mesaj\u0131 g\u00f6sterecektir.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><strong>4.6 Sistemi Yeniden Ba\u015flatma<\/strong><\/p>\n<p>Root parolas\u0131n\u0131 s\u0131f\u0131rlad\u0131ktan sonra, sistemi yeniden ba\u015flatman\u0131z gerekmektedir. Bu i\u015flem, yeni parolan\u0131n etkinle\u015fmesini sa\u011flayacakt\u0131r.<\/p>\n<ol>\n<li><strong>Sistemden \u00c7\u0131k\u0131\u015f:<\/strong>\n<ul>\n<li>K\u00f6k dizinden \u00e7\u0131kmak i\u00e7in (e\u011fer <code>chroot<\/code> kulland\u0131ysan\u0131z) a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">exit<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li>Bu komut, <code>chroot<\/code> ortam\u0131ndan \u00e7\u0131kacak ve orijinal kabu\u011funuza geri d\u00f6neceksiniz.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tek Kullan\u0131c\u0131 Modundan \u00c7\u0131k\u0131\u015f:<\/strong>\n<ul>\n<li>Tek kullan\u0131c\u0131 modundan \u00e7\u0131kmak i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">exit<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li>Bu komut, tek kullan\u0131c\u0131 modundan \u00e7\u0131kacak ve sisteme yeniden ba\u015flatma sinyali g\u00f6nderecektir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Sistemi Yeniden Ba\u015flatma:<\/strong>\n<ul>\n<li>Sistem otomatik olarak yeniden ba\u015flat\u0131lacakt\u0131r. E\u011fer sistem otomatik olarak yeniden ba\u015flat\u0131lmazsa, a\u015fa\u011f\u0131daki komutu kullanarak sistemi manuel olarak yeniden ba\u015flatabilirsiniz:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">reboot<\/span>\r\n<\/code><\/pre>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Yeni Parola ile Giri\u015f Yapma:<\/strong>\n<ul>\n<li>Sistem yeniden ba\u015flat\u0131ld\u0131ktan sonra, konsol veya SSH arac\u0131l\u0131\u011f\u0131yla sisteme giri\u015f yapmay\u0131 deneyin. Giri\u015f yaparken, az \u00f6nce belirledi\u011finiz yeni root parolas\u0131n\u0131 kullan\u0131n.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Ba\u015far\u0131l\u0131 Giri\u015f:<\/strong>\n<ul>\n<li>E\u011fer yeni parolay\u0131 do\u011fru girdiyseniz, sisteme ba\u015far\u0131l\u0131 bir \u015fekilde giri\u015f yapabileceksiniz.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><strong>\u00d6zet:<\/strong><\/p>\n<p>ESXi konsolundan do\u011frudan eri\u015fim ile AlmaLinux VDS root parolas\u0131n\u0131 s\u0131f\u0131rlama i\u015flemi, a\u015fa\u011f\u0131daki ad\u0131mlar\u0131 i\u00e7erir:<\/p>\n<ol>\n<li>ESXi Sunucusuna SSH ile Ba\u011flanma (veya Konsolu Kullanma)<\/li>\n<li>AlmaLinux VDS&#8217;nin Sanal Makine Konsoluna Eri\u015fme<\/li>\n<li>Tek Kullan\u0131c\u0131 Moduna Ge\u00e7me<\/li>\n<li>Root Dosya Sistemini Yaz\u0131labilir Hale Getirme<\/li>\n<li><code>passwd<\/code> Komutu ile Root Parolas\u0131n\u0131 De\u011fi\u015ftirme<\/li>\n<li>Sistemi Yeniden Ba\u015flatma<\/li>\n<\/ol>\n<p>Bu ad\u0131mlar\u0131 dikkatlice takip ederek, AlmaLinux VDS&#8217;nizin root parolas\u0131n\u0131 ba\u015far\u0131yla s\u0131f\u0131rlayabilir ve sisteme eri\u015fiminizi yeniden sa\u011flayabilirsiniz. Unutmay\u0131n, root parolas\u0131n\u0131n g\u00fcvenli\u011fi, t\u00fcm sistemin g\u00fcvenli\u011fiyle e\u015fde\u011ferdir. Bu nedenle, g\u00fc\u00e7l\u00fc ve benzersiz bir parola se\u00e7ti\u011finizden ve parolay\u0131 g\u00fcvenli bir yerde saklad\u0131\u011f\u0131n\u0131zdan emin olun. &#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221;nin bu b\u00f6l\u00fcm\u00fc, size bu s\u00fcre\u00e7te rehberlik etmek i\u00e7in tasarlanm\u0131\u015ft\u0131r.<\/p>\n<p><strong>Sorun Giderme \u0130pu\u00e7lar\u0131:<\/strong><\/p>\n<ul>\n<li><strong>GRUB Men\u00fcs\u00fcne Eri\u015filememesi:<\/strong> Sanal makine yeniden ba\u015flat\u0131l\u0131rken GRUB men\u00fcs\u00fcne eri\u015femiyorsan\u0131z, sanal makinenin BIOS ayarlar\u0131nda POST ekran\u0131nda klavye giri\u015finin etkinle\u015ftirildi\u011finden emin olun. Ayr\u0131ca, ESXi ayarlar\u0131nda sanal makine i\u00e7in &#8220;Boot Options&#8221; k\u0131sm\u0131nda &#8220;Force BIOS setup&#8221; se\u00e7ene\u011finin etkinle\u015ftirilmesi GRUB men\u00fcs\u00fcne eri\u015fimi kolayla\u015ft\u0131rabilir.<\/li>\n<li><strong>K\u00f6k Dosya Sisteminin Montajlanamamas\u0131:<\/strong> K\u00f6k dosya sistemini yeniden montajlarken bir hata mesaj\u0131 al\u0131rsan\u0131z, dosya sisteminin tutarl\u0131 oldu\u011fundan emin olun. <code>fsck<\/code> komutunu kullanarak dosya sistemini kontrol edebilir ve onarabilirsiniz.<\/li>\n<li><strong>Parola De\u011fi\u015fikli\u011finin Uygulanamamas\u0131:<\/strong> Parola de\u011fi\u015fikli\u011fini uygulad\u0131ktan sonra sisteme giri\u015f yaparken sorun ya\u015f\u0131yorsan\u0131z, klavye d\u00fczeninin do\u011fru oldu\u011fundan emin olun. Ayr\u0131ca, \u043f\u0430\u0440\u043e\u043b\u0430 giri\u015finde b\u00fcy\u00fck\/k\u00fc\u00e7\u00fck harf duyarl\u0131l\u0131\u011f\u0131na dikkat edin.<\/li>\n<li><strong>SSH Ba\u011flant\u0131 Sorunlar\u0131:<\/strong> ESXi sunucusuna SSH ile ba\u011flan\u0131rken sorun ya\u015f\u0131yorsan\u0131z, SSH servisinin etkinle\u015ftirildi\u011finden ve g\u00fcvenlik duvar\u0131 ayarlar\u0131n\u0131n do\u011fru yap\u0131land\u0131r\u0131ld\u0131\u011f\u0131ndan emin olun. ESXi g\u00fcvenlik duvar\u0131, SSH trafi\u011fini engelleyebilir.<\/li>\n<\/ul>\n<p>Bu detayl\u0131 rehber sayesinde, ESXi konsolundan do\u011frudan eri\u015fim ile AlmaLinux VDS root parolas\u0131n\u0131 s\u0131f\u0131rlama i\u015flemini ba\u015far\u0131yla ger\u00e7ekle\u015ftirebilirsiniz. Unutmay\u0131n, bu i\u015flem s\u0131ras\u0131nda dikkatli olmak ve ad\u0131mlar\u0131 do\u011fru bir \u015fekilde takip etmek, sisteminizin g\u00fcvenli\u011fini ve istikrar\u0131n\u0131 koruman\u0131za yard\u0131mc\u0131 olacakt\u0131r. &#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221;nin bu b\u00f6l\u00fcm\u00fc, size bu konuda kapsaml\u0131 bir bilgi sa\u011flamay\u0131 ama\u00e7lamaktad\u0131r.<\/p>\n<h2 id=\"5-kurtarma-modu-ile-almalinux-vds-root-parolas-n-s-f-rlama\"><span class=\"ez-toc-section\" id=\"5_Kurtarma_Modu_ile_AlmaLinux_VDS_Root_Parolasini_Sifirlama\"><\/span>5. Kurtarma Modu ile AlmaLinux VDS Root Parolas\u0131n\u0131 S\u0131f\u0131rlama<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Kurtarma modu ile AlmaLinux VDS root parolas\u0131n\u0131 s\u0131f\u0131rlama, sistemin normal \u015fekilde ba\u015flat\u0131lamad\u0131\u011f\u0131 veya GRUB men\u00fcs\u00fcne eri\u015filemedi\u011fi durumlarda ba\u015fvurulabilecek g\u00fc\u00e7l\u00fc bir y\u00f6ntemdir. Bu y\u00f6ntem, bir kurtarma ISO (disk g\u00f6r\u00fcnt\u00fcs\u00fc) dosyas\u0131 kullan\u0131larak sistemin minimal bir ortamda ba\u015flat\u0131lmas\u0131n\u0131 ve root dosya sistemine eri\u015filerek parola s\u0131f\u0131rlama i\u015fleminin ger\u00e7ekle\u015ftirilmesini sa\u011flar. &#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221; kapsam\u0131nda, bu b\u00f6l\u00fcm, kurtarma modunu kullanarak AlmaLinux VDS \u00fczerindeki root parolas\u0131n\u0131 nas\u0131l g\u00fcvenli ve etkili bir \u015fekilde s\u0131f\u0131rlayaca\u011f\u0131n\u0131z\u0131 ad\u0131m ad\u0131m a\u00e7\u0131klayacakt\u0131r. Bu y\u00f6ntem, \u00f6zellikle sistem y\u00f6neticileri ve sanal ortamlarla \u00e7al\u0131\u015fanlar i\u00e7in hayati bir bilgi kayna\u011f\u0131d\u0131r.<\/p>\n<p><strong>5.1 Kurtarma Modu ISO Dosyas\u0131n\u0131 \u0130ndirme ve ESXi&#8217;ye Y\u00fckleme<\/strong><\/p>\n<p>Kurtarma modu ile parola s\u0131f\u0131rlama i\u015flemine ba\u015flamak i\u00e7in, \u00f6ncelikle AlmaLinux i\u00e7in uygun bir kurtarma ISO dosyas\u0131 indirmeniz ve bu dosyay\u0131 ESXi datastore&#8217;una (veri deposu) y\u00fcklemeniz gerekmektedir.<\/p>\n<ol>\n<li><strong>Kurtarma ISO Dosyas\u0131 Se\u00e7imi:<\/strong>\n<ul>\n<li><strong>AlmaLinux Resmi Web Sitesi:<\/strong> En g\u00fcvenilir kaynak, AlmaLinux&#8217;in resmi web sitesidir. Genellikle &#8220;Downloads&#8221; veya &#8220;Mirror&#8221; b\u00f6l\u00fcmlerinde, farkl\u0131 mimariler (x86_64, aarch64 vb.) i\u00e7in kurtarma ISO dosyalar\u0131n\u0131 bulabilirsiniz.<\/li>\n<li><strong>Minimal ISO:<\/strong> Kurtarma i\u015flemleri i\u00e7in genellikle &#8220;Minimal ISO&#8221; veya &#8220;NetInstall ISO&#8221; olarak adland\u0131r\u0131lan, en k\u00fc\u00e7\u00fck boyuttaki ISO dosyalar\u0131n\u0131 tercih etmek daha pratiktir. Bu dosyalar, sadece temel sistem bile\u015fenlerini i\u00e7erir ve indirme s\u00fcresini k\u0131salt\u0131r.<\/li>\n<li><strong>Versiyon Uyumlulu\u011fu:<\/strong> \u0130ndirece\u011finiz kurtarma ISO dosyas\u0131n\u0131n, AlmaLinux VDS&#8217;nizin kulland\u0131\u011f\u0131 AlmaLinux versiyonuyla uyumlu olmas\u0131na dikkat edin. Versiyon uyumsuzlu\u011fu, kurtarma i\u015fleminin ba\u015far\u0131s\u0131z olmas\u0131na neden olabilir.<\/li>\n<li><strong>\u00d6rnek:<\/strong> AlmaLinux 8 kullan\u0131yorsan\u0131z, AlmaLinux 8 i\u00e7in haz\u0131rlanm\u0131\u015f bir kurtarma ISO dosyas\u0131 indirmeniz gerekmektedir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Kurtarma ISO Dosyas\u0131n\u0131 \u0130ndirme:<\/strong>\n<ul>\n<li>AlmaLinux resmi web sitesi veya g\u00fcvenilir bir mirror sitesinden, uygun kurtarma ISO dosyas\u0131n\u0131 bilgisayar\u0131n\u0131za indirin.<\/li>\n<li>Dosyan\u0131n b\u00fct\u00fcnl\u00fc\u011f\u00fcn\u00fc do\u011frulamak i\u00e7in, indirme sayfas\u0131nda belirtilen SHA256 veya di\u011fer sa\u011flama toplam\u0131 (checksum) de\u011ferlerini kullanarak dosyan\u0131n do\u011fru bir \u015fekilde indirildi\u011finden emin olun. Bu, indirilen dosyan\u0131n bozulmad\u0131\u011f\u0131n\u0131 ve g\u00fcvenilir oldu\u011funu garanti eder.<\/li>\n<\/ul>\n<\/li>\n<li><strong>ESXi Datastore&#8217;una Y\u00fckleme:<\/strong>\n<ul>\n<li><strong>vSphere Client veya vSphere Web Client&#8217;a Giri\u015f:<\/strong> Web taray\u0131c\u0131n\u0131z arac\u0131l\u0131\u011f\u0131yla vSphere Client veya vSphere Web Client aray\u00fcz\u00fcne giri\u015f yap\u0131n.<\/li>\n<li><strong>Datastore&#8217;u Se\u00e7me:<\/strong> Giri\u015f yapt\u0131ktan sonra, &#8220;Storage&#8221; (Depolama) b\u00f6l\u00fcm\u00fcne gidin ve kurtarma ISO dosyas\u0131n\u0131 y\u00fcklemek istedi\u011finiz datastore&#8217;u se\u00e7in.<\/li>\n<li><strong>Dosya Y\u00fckleme:<\/strong> Datastore se\u00e7ildikten sonra, &#8220;Files&#8221; (Dosyalar) veya &#8220;Datastore Browser&#8221; (Veri Deposu Taray\u0131c\u0131s\u0131) se\u00e7ene\u011fini t\u0131klayarak datastore i\u00e7eri\u011fini g\u00f6r\u00fcnt\u00fcleyin.<\/li>\n<li><strong>Upload Files:<\/strong> &#8220;Upload Files&#8221; (Dosyalar\u0131 Y\u00fckle) veya benzer bir se\u00e7ene\u011fi kullanarak, indirdi\u011finiz kurtarma ISO dosyas\u0131n\u0131 datastore&#8217;a y\u00fckleyin.<\/li>\n<li><strong>Y\u00fckleme S\u00fcresi:<\/strong> Y\u00fckleme s\u00fcresi, ISO dosyas\u0131n\u0131n boyutuna ve a\u011f ba\u011flant\u0131 h\u0131z\u0131n\u0131za ba\u011fl\u0131 olarak de\u011fi\u015febilir.<\/li>\n<li><strong>Alternatif Y\u00f6ntemler:<\/strong> E\u011fer ESXi ortam\u0131n\u0131zda vCenter Server kullan\u0131l\u0131yorsa, vCenter Server arac\u0131l\u0131\u011f\u0131yla da ISO dosyas\u0131n\u0131 datastore&#8217;a y\u00fckleyebilirsiniz.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><strong>5.2 VDS&#8217;yi Kurtarma Modunda Ba\u015flatma<\/strong><\/p>\n<p>Kurtarma ISO dosyas\u0131 ESXi datastore&#8217;una y\u00fcklendikten sonra, AlmaLinux VDS&#8217;nizi bu ISO dosyas\u0131ndan ba\u015flatman\u0131z gerekmektedir. Bu i\u015flem, sanal makine ayarlar\u0131n\u0131 d\u00fczenleyerek ve BIOS ba\u015flatma s\u0131ras\u0131n\u0131 de\u011fi\u015ftirerek ger\u00e7ekle\u015ftirilir.<\/p>\n<ol>\n<li><strong>Sanal Makine Ayarlar\u0131n\u0131 D\u00fczenleme:<\/strong>\n<ul>\n<li><strong>vSphere Aray\u00fcz\u00fcne Giri\u015f:<\/strong> Web taray\u0131c\u0131n\u0131z arac\u0131l\u0131\u011f\u0131yla vSphere Client veya vSphere Web Client aray\u00fcz\u00fcne giri\u015f yap\u0131n.<\/li>\n<li><strong>Sanal Makine Listesini G\u00f6r\u00fcnt\u00fcleme:<\/strong> Giri\u015f yapt\u0131ktan sonra, sanal makinelerin listesini g\u00f6r\u00fcnt\u00fcleyin.<\/li>\n<li><strong>AlmaLinux VDS&#8217;nizi Se\u00e7me:<\/strong> Listedeki sanal makineler aras\u0131ndan AlmaLinux VDS&#8217;nizi bulun ve se\u00e7in.<\/li>\n<li><strong>Edit Settings:<\/strong> Sanal makine se\u00e7ildikten sonra, &#8220;Edit Settings&#8221; (Ayarlar\u0131 D\u00fczenle) veya benzer bir se\u00e7ene\u011fi t\u0131klayarak sanal makine ayarlar\u0131n\u0131 a\u00e7\u0131n.<\/li>\n<\/ul>\n<\/li>\n<li><strong>CD\/DVD S\u00fcr\u00fcc\u00fcs\u00fcn\u00fc Ekleme veya D\u00fczenleme:<\/strong>\n<ul>\n<li><strong>Add Hardware:<\/strong> Sanal makine ayarlar\u0131nda, &#8220;Add Hardware&#8221; (Donan\u0131m Ekle) veya benzer bir se\u00e7ene\u011fi t\u0131klayarak yeni bir donan\u0131m ekleyebilirsiniz.<\/li>\n<li><strong>CD\/DVD Drive:<\/strong> Donan\u0131m listesinden &#8220;CD\/DVD Drive&#8221; (CD\/DVD S\u00fcr\u00fcc\u00fcs\u00fc) se\u00e7ene\u011fini se\u00e7in ve ekleyin. E\u011fer zaten bir CD\/DVD s\u00fcr\u00fcc\u00fcs\u00fc varsa, bu ad\u0131m\u0131 atlayabilirsiniz.<\/li>\n<li><strong>Datastore ISO File:<\/strong> CD\/DVD s\u00fcr\u00fcc\u00fcs\u00fc ayarlar\u0131nda, &#8220;Datastore ISO File&#8221; (Veri Deposu ISO Dosyas\u0131) se\u00e7ene\u011fini se\u00e7in.<\/li>\n<li><strong>Browse:<\/strong> &#8220;Browse&#8221; (G\u00f6zat) butonunu t\u0131klayarak, daha \u00f6nce ESXi datastore&#8217;una y\u00fckledi\u011finiz kurtarma ISO dosyas\u0131n\u0131 bulun ve se\u00e7in.<\/li>\n<li><strong>Connect at power on:<\/strong> &#8220;Connect at power on&#8221; (A\u00e7\u0131l\u0131\u015fta Ba\u011flan) se\u00e7ene\u011fini i\u015faretleyin. Bu, sanal makinenin her yeniden ba\u015flat\u0131ld\u0131\u011f\u0131nda ISO dosyas\u0131na otomatik olarak ba\u011flanmas\u0131n\u0131 sa\u011flayacakt\u0131r.<\/li>\n<\/ul>\n<\/li>\n<li><strong>BIOS Ba\u015flatma S\u0131ras\u0131n\u0131 De\u011fi\u015ftirme:<\/strong>\n<ul>\n<li><strong>VM Options:<\/strong> Sanal makine ayarlar\u0131nda, &#8220;VM Options&#8221; (Sanal Makine Se\u00e7enekleri) veya benzer bir b\u00f6l\u00fcme gidin.<\/li>\n<li><strong>Boot Options:<\/strong> &#8220;Boot Options&#8221; (Ba\u015flatma Se\u00e7enekleri) b\u00f6l\u00fcm\u00fcn\u00fc bulun.<\/li>\n<li><strong>Force BIOS setup:<\/strong> &#8220;Force BIOS setup&#8221; (BIOS kurulumunu zorla) veya benzer bir se\u00e7ene\u011fi i\u015faretleyin. Bu, sanal makinenin bir sonraki ba\u015flat\u0131l\u0131\u015f\u0131nda BIOS kurulum ekran\u0131na girmesini sa\u011flayacakt\u0131r.<\/li>\n<li><strong>BIOS&#8217;a Giri\u015f:<\/strong> Sanal makineyi yeniden ba\u015flatt\u0131\u011f\u0131n\u0131zda, BIOS kurulum ekran\u0131na girmek i\u00e7in ekranda belirtilen tu\u015fa (genellikle Del, F2 veya Esc) bas\u0131n.<\/li>\n<li><strong>Boot Order:<\/strong> BIOS kurulum ekran\u0131nda, &#8220;Boot Order&#8221; (Ba\u015flatma S\u0131ras\u0131) veya benzer bir b\u00f6l\u00fcm\u00fc bulun.<\/li>\n<li><strong>CD-ROM Drive:<\/strong> CD-ROM s\u00fcr\u00fcc\u00fcs\u00fcn\u00fc (veya DVD s\u00fcr\u00fcc\u00fcs\u00fcn\u00fc) ba\u015flatma s\u0131ras\u0131n\u0131n en \u00fcst\u00fcne ta\u015f\u0131y\u0131n. Bu, sanal makinenin \u00f6nce CD\/DVD s\u00fcr\u00fcc\u00fcs\u00fcnden ba\u015flat\u0131lmas\u0131n\u0131 sa\u011flayacakt\u0131r.<\/li>\n<li><strong>Save and Exit:<\/strong> BIOS ayarlar\u0131n\u0131 kaydedin ve \u00e7\u0131k\u0131n.<\/li>\n<\/ul>\n<\/li>\n<li><strong>VDS&#8217;yi Yeniden Ba\u015flatma:<\/strong>\n<ul>\n<li><strong>Power On:<\/strong> Sanal makine ayarlar\u0131n\u0131 kaydedip \u00e7\u0131kt\u0131ktan sonra, AlmaLinux VDS&#8217;nizi yeniden ba\u015flat\u0131n.<\/li>\n<li><strong>Boot from ISO:<\/strong> BIOS ayarlar\u0131n\u0131 do\u011fru yap\u0131land\u0131rd\u0131ysan\u0131z, sanal makine kurtarma ISO dosyas\u0131ndan ba\u015flat\u0131lacakt\u0131r.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><strong>5.3 K\u00f6k Dosya Sistemini Montajlama<\/strong><\/p>\n<p>Kurtarma modunda ba\u015flat\u0131lan sistemde, root parolas\u0131n\u0131 s\u0131f\u0131rlamak i\u00e7in \u00f6ncelikle AlmaLinux VDS&#8217;nizin k\u00f6k dosya sistemini (root filesystem) bulman\u0131z ve montajlaman\u0131z gerekmektedir.<\/p>\n<ol>\n<li><strong>Kurtarma Ortam\u0131na Giri\u015f:<\/strong>\n<ul>\n<li>Kurtarma ISO dosyas\u0131ndan ba\u015flat\u0131lan sistem, genellikle bir komut sat\u0131r\u0131 aray\u00fcz\u00fc veya bir metin tabanl\u0131 men\u00fc sunar.<\/li>\n<li>Kurtarma men\u00fcs\u00fcnde, &#8220;Rescue a Linux system&#8221; (Bir Linux sistemini kurtar) veya benzer bir se\u00e7ene\u011fi se\u00e7in.<\/li>\n<li>Sistem, mevcut disk b\u00f6l\u00fcmlerini ve dosya sistemlerini otomatik olarak alg\u0131lamaya \u00e7al\u0131\u015facakt\u0131r.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Disk B\u00f6l\u00fcmlerini Listeleme:<\/strong>\n<ul>\n<li>E\u011fer sistem otomatik olarak k\u00f6k dosya sistemini alg\u0131layamazsa, disk b\u00f6l\u00fcmlerini manuel olarak listelemeniz gerekebilir.<\/li>\n<li>Komut sat\u0131r\u0131nda a\u015fa\u011f\u0131daki komutu kullanarak disk b\u00f6l\u00fcmlerini listeleyin:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">lsblk<\/span>\r\n<\/code><\/pre>\n<p>Bu komut, mevcut disk b\u00f6l\u00fcmlerini ve bunlar\u0131n boyutlar\u0131n\u0131, t\u00fcrlerini ve ba\u011flama noktalar\u0131n\u0131 listeleyecektir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Mant\u0131ksal Birimleri (LVM) Etkinle\u015ftirme (Gerekirse):<\/strong>\n<ul>\n<li>E\u011fer AlmaLinux VDS&#8217;niz LVM (Logical Volume Manager) kullan\u0131yorsa, \u00f6ncelikle LVM&#8217;yi etkinle\u015ftirmeniz gerekmektedir.<\/li>\n<li>A\u015fa\u011f\u0131daki komutlar\u0131 kullanarak LVM&#8217;yi etkinle\u015ftirin:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">vgscan\r\nvgchange -ay<\/span>\r\n<\/code><\/pre>\n<ul>\n<li><code>vgscan<\/code>: Sistemdeki t\u00fcm Volume Group&#8217;lar\u0131 (VG) tarar.<\/li>\n<li><code>vgchange -ay<\/code>: T\u00fcm Volume Group&#8217;lar\u0131 aktif hale getirir.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>K\u00f6k Dosya Sistemini Bulma:<\/strong>\n<ul>\n<li><code>lsblk<\/code> komutunun \u00e7\u0131kt\u0131s\u0131n\u0131 inceleyerek, AlmaLinux VDS&#8217;nizin k\u00f6k dosya sistemini i\u00e7eren b\u00f6l\u00fcm\u00fc bulun.<\/li>\n<li>K\u00f6k dosya sistemi genellikle <code>\/<\/code> (k\u00f6k) olarak i\u015faretlenir veya &#8220;root&#8221; etiketiyle belirtilir.<\/li>\n<li>LVM kullan\u0131l\u0131yorsa, k\u00f6k dosya sistemi genellikle <code>\/dev\/mapper\/almalinux-root<\/code> veya benzer bir adrese sahip olacakt\u0131r.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Montaj Noktas\u0131 Olu\u015fturma:<\/strong>\n<ul>\n<li>K\u00f6k dosya sistemini montajlamak i\u00e7in, bir montaj noktas\u0131 (mount point) olu\u015fturman\u0131z gerekmektedir.<\/li>\n<li>A\u015fa\u011f\u0131daki komutu kullanarak bir montaj noktas\u0131 olu\u015fturun:\n<pre><code class=\"lang-bash\"><span class=\"hljs-built_in\">mkdir<\/span> \/mnt\r\n<\/code><\/pre>\n<p>Bu komut, <code>\/mnt<\/code> ad\u0131nda bir dizin olu\u015fturacakt\u0131r. Bu dizin, k\u00f6k dosya sistemini montajlamak i\u00e7in kullan\u0131lacakt\u0131r.<\/li>\n<\/ul>\n<\/li>\n<li><strong>K\u00f6k Dosya Sistemini Montajlama:<\/strong>\n<ul>\n<li>A\u015fa\u011f\u0131daki komutu kullanarak k\u00f6k dosya sistemini <code>\/mnt<\/code> dizinine monte edin:\n<pre><code class=\"lang-bash\">mount <span class=\"hljs-regexp\">\/dev\/m<\/span>apper<span class=\"hljs-regexp\">\/almalinux-root \/m<\/span>nt\r\n<\/code><\/pre>\n<ul>\n<li><code>\/dev\/mapper\/almalinux-root<\/code>: K\u00f6k dosya sistemini i\u00e7eren b\u00f6l\u00fcm\u00fcn adresi (LVM \u00f6rne\u011fi). Ger\u00e7ek adres, sisteminize g\u00f6re de\u011fi\u015fiklik g\u00f6sterebilir.<\/li>\n<li><code>\/mnt<\/code>: Montaj noktas\u0131 olarak belirledi\u011finiz dizin.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Hata Mesajlar\u0131n\u0131 Kontrol Etme:<\/strong>\n<ul>\n<li>Montaj i\u015flemi s\u0131ras\u0131nda herhangi bir hata mesaj\u0131 al\u0131rsan\u0131z, sorunu gidermeden i\u015fleme devam etmeyin. Hata mesajlar\u0131, dosya sisteminde bir sorun oldu\u011funu veya komutun do\u011fru \u015fekilde \u00e7al\u0131\u015fmad\u0131\u011f\u0131n\u0131 g\u00f6sterebilir.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><strong>5.4 <code>chroot<\/code> Komutu ile K\u00f6k Dizine Ge\u00e7me<\/strong><\/p>\n<p>K\u00f6k dosya sistemi ba\u015far\u0131yla <code>\/mnt<\/code> dizinine monte edildikten sonra, <code>chroot<\/code> komutunu kullanarak k\u00f6k dizine ge\u00e7meniz gerekmektedir. Bu i\u015flem, sisteme de\u011fi\u015fiklik yapabilmeniz ve root parolas\u0131n\u0131 s\u0131f\u0131rlayabilmeniz i\u00e7in gereklidir.<\/p>\n<ol>\n<li><strong><code>chroot<\/code> Komutu:<\/strong>\n<ul>\n<li><code>chroot<\/code> komutu, mevcut i\u015flem i\u00e7in k\u00f6k dizinini de\u011fi\u015ftirmenizi sa\u011flar. Bu, sistemin geri kalan\u0131ndan izole edilmi\u015f bir ortamda \u00e7al\u0131\u015fman\u0131z\u0131 sa\u011flar.<\/li>\n<\/ul>\n<\/li>\n<li><strong>K\u00f6k Dizine Ge\u00e7me:<\/strong>\n<ul>\n<li>K\u00f6k dizine ge\u00e7mek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">chroot<\/span> \/mnt\r\n<\/code><\/pre>\n<p>Bu komut, mevcut kabu\u011funuzun (shell) k\u00f6k dizinini <code>\/mnt<\/code> olarak de\u011fi\u015ftirecektir. Art\u0131k, sistemin ger\u00e7ek k\u00f6k dizinindeymi\u015f gibi komutlar \u00e7al\u0131\u015ft\u0131rabilirsiniz.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Komut \u0130stemi De\u011fi\u015fikli\u011fi:<\/strong>\n<ul>\n<li><code>chroot<\/code> komutunu \u00e7al\u0131\u015ft\u0131rd\u0131ktan sonra, komut isteminiz de\u011fi\u015febilir. Bu, k\u00f6k dizinin ba\u015far\u0131yla de\u011fi\u015ftirildi\u011fini g\u00f6sterir.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><strong>5.5 <code>passwd<\/code> Komutu ile Root Parolas\u0131n\u0131 De\u011fi\u015ftirme<\/strong><\/p>\n<p>K\u00f6k dizine ge\u00e7tikten sonra, art\u0131k root parolas\u0131n\u0131 s\u0131f\u0131rlayabilirsiniz. Bu i\u015flem, <code>passwd<\/code> komutu kullan\u0131larak ger\u00e7ekle\u015ftirilir.<\/p>\n<ol>\n<li><strong><code>passwd<\/code> Komutu:<\/strong>\n<ul>\n<li><code>passwd<\/code> komutu, kullan\u0131c\u0131 parolalar\u0131n\u0131 de\u011fi\u015ftirmek i\u00e7in kullan\u0131lan bir Linux komutudur.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Root Parolas\u0131n\u0131 De\u011fi\u015ftirme:<\/strong>\n<ul>\n<li>Root parolas\u0131n\u0131 de\u011fi\u015ftirmek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">passwd<\/span>\r\n<\/code><\/pre>\n<p>Bu komutu \u00e7al\u0131\u015ft\u0131rd\u0131\u011f\u0131n\u0131zda, sistem sizden yeni bir root parolas\u0131 girmenizi isteyecektir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>G\u00fc\u00e7l\u00fc Bir Parola Se\u00e7me:<\/strong>\n<ul>\n<li>Yeni root parolas\u0131 se\u00e7erken, g\u00fc\u00e7l\u00fc ve benzersiz bir parola se\u00e7ti\u011finizden emin olun. G\u00fc\u00e7l\u00fc bir parola, a\u015fa\u011f\u0131daki \u00f6zelliklere sahip olmal\u0131d\u0131r:\n<ul>\n<li><strong>Uzunluk:<\/strong> En az 12 karakter uzunlu\u011funda olmal\u0131d\u0131r.<\/li>\n<li><strong>Karma\u015f\u0131kl\u0131k:<\/strong> B\u00fcy\u00fck harfler, k\u00fc\u00e7\u00fck harfler, rakamlar ve semboller i\u00e7ermelidir.<\/li>\n<li><strong>Tahmin Edilebilirlik:<\/strong> S\u00f6zl\u00fck kelimeleri, do\u011fum tarihleri veya kolayca tahmin edilebilecek di\u011fer bilgiler i\u00e7ermemelidir.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Parolay\u0131 Do\u011frulama:<\/strong>\n<ul>\n<li>Yeni parolay\u0131 girdikten sonra, sistem sizden parolay\u0131 tekrar girerek do\u011frulaman\u0131z\u0131 isteyecektir. Parolay\u0131 do\u011fru girdi\u011finizden emin olun.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Parola Ba\u015far\u0131yla De\u011fi\u015ftirildi Mesaj\u0131:<\/strong>\n<ul>\n<li>Parola ba\u015far\u0131yla de\u011fi\u015ftirildikten sonra, sistem size bir &#8220;parola ba\u015far\u0131yla de\u011fi\u015ftirildi&#8221; mesaj\u0131 g\u00f6sterecektir.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><strong>5.6 Sistemi Yeniden Ba\u015flatma<\/strong><\/p>\n<p>Root parolas\u0131n\u0131 s\u0131f\u0131rlad\u0131ktan sonra, sistemi yeniden ba\u015flatman\u0131z gerekmektedir. Bu i\u015flem, yeni parolan\u0131n etkinle\u015fmesini sa\u011flayacakt\u0131r.<\/p>\n<ol>\n<li><strong>Sistemden \u00c7\u0131k\u0131\u015f:<\/strong>\n<ul>\n<li>K\u00f6k dizinden \u00e7\u0131kmak i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">exit<\/span>\r\n<\/code><\/pre>\n<p>Bu komut, <code>chroot<\/code> ortam\u0131ndan \u00e7\u0131kacak ve kurtarma ortam\u0131na geri d\u00f6neceksiniz.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Montaj\u0131 Kald\u0131rma:<\/strong>\n<ul>\n<li>K\u00f6k dosya sisteminin montaj\u0131n\u0131 kald\u0131rmak i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">umount<\/span> \/mnt\r\n<\/code><\/pre>\n<p>Bu komut, <code>\/mnt<\/code> dizinine monte edilmi\u015f olan k\u00f6k dosya sisteminin montaj\u0131n\u0131 kald\u0131racakt\u0131r.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Sistemi Yeniden Ba\u015flatma:<\/strong>\n<ul>\n<li>Sistemi yeniden ba\u015flatmak i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">reboot<\/span>\r\n<\/code><\/pre>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>BIOS Ayarlar\u0131n\u0131 S\u0131f\u0131rlama:<\/strong>\n<ul>\n<li>Sanal makine yeniden ba\u015flat\u0131l\u0131rken, BIOS ayarlar\u0131n\u0131 s\u0131f\u0131rlaman\u0131z gerekebilir.<\/li>\n<li>ESXi aray\u00fcz\u00fcnden, sanal makine ayarlar\u0131n\u0131 d\u00fczenleyin ve &#8220;Boot Options&#8221; (Ba\u015flatma Se\u00e7enekleri) b\u00f6l\u00fcm\u00fcnde &#8220;Force BIOS setup&#8221; se\u00e7ene\u011fini kald\u0131r\u0131n.<\/li>\n<li>CD\/DVD s\u00fcr\u00fcc\u00fcs\u00fcn\u00fc de kald\u0131rabilir veya kurtarma ISO dosyas\u0131n\u0131 s\u00fcr\u00fcc\u00fcden ay\u0131rabilirsiniz.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Yeni Parola ile Giri\u015f Yapma:<\/strong>\n<ul>\n<li>Sistem yeniden ba\u015flat\u0131ld\u0131ktan sonra, konsol veya SSH arac\u0131l\u0131\u011f\u0131yla sisteme giri\u015f yapmay\u0131 deneyin. Giri\u015f yaparken, az \u00f6nce belirledi\u011finiz yeni root parolas\u0131n\u0131 kullan\u0131n.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Ba\u015far\u0131l\u0131 Giri\u015f:<\/strong>\n<ul>\n<li>E\u011fer yeni parolay\u0131 do\u011fru girdiyseniz, sisteme ba\u015far\u0131l\u0131 bir \u015fekilde giri\u015f yapabileceksiniz.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><strong>\u00d6zet:<\/strong><\/p>\n<p>Kurtarma modu ile AlmaLinux VDS root parolas\u0131n\u0131 s\u0131f\u0131rlama i\u015flemi, a\u015fa\u011f\u0131daki ad\u0131mlar\u0131 i\u00e7erir:<\/p>\n<ol>\n<li>Kurtarma Modu ISO Dosyas\u0131n\u0131 \u0130ndirme ve ESXi&#8217;ye Y\u00fckleme<\/li>\n<li>VDS&#8217;yi Kurtarma Modunda Ba\u015flatma<\/li>\n<li>K\u00f6k Dosya Sistemini Montajlama<\/li>\n<li><code>chroot<\/code> Komutu ile K\u00f6k Dizine Ge\u00e7me<\/li>\n<li><code>passwd<\/code> Komutu ile Yeni Root Parolas\u0131n\u0131 Belirleme<\/li>\n<li>Sistemi Yeniden Ba\u015flatma<\/li>\n<\/ol>\n<p>Bu ad\u0131mlar\u0131 dikkatlice takip ederek, AlmaLinux VDS&#8217;nizin root parolas\u0131n\u0131 ba\u015far\u0131yla s\u0131f\u0131rlayabilir ve sisteme eri\u015fiminizi yeniden sa\u011flayabilirsiniz. Unutmay\u0131n, root parolas\u0131n\u0131n g\u00fcvenli\u011fi, t\u00fcm sistemin g\u00fcvenli\u011fiyle e\u015fde\u011ferdir. Bu nedenle, g\u00fc\u00e7l\u00fc ve benzersiz bir parola se\u00e7ti\u011finizden ve parolay\u0131 g\u00fcvenli bir yerde saklad\u0131\u011f\u0131n\u0131zdan emin olun. &#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221;nin bu b\u00f6l\u00fcm\u00fc, size bu s\u00fcre\u00e7te rehberlik etmek i\u00e7in tasarlanm\u0131\u015ft\u0131r.<\/p>\n<p><strong>Sorun Giderme \u0130pu\u00e7lar\u0131:<\/strong><\/p>\n<ul>\n<li><strong>Kurtarma ISO Dosyas\u0131n\u0131n Bulunamamas\u0131:<\/strong> AlmaLinux i\u00e7in uygun bir kurtarma ISO dosyas\u0131 bulmakta zorlan\u0131yorsan\u0131z, CentOS veya Red Hat Enterprise Linux (RHEL) kurtarma ISO dosyalar\u0131n\u0131 da kullanabilirsiniz. Ancak, versiyon uyumlulu\u011funa dikkat etmeniz \u00f6nemlidir.<\/li>\n<li><strong>K\u00f6k Dosya Sisteminin Alg\u0131lanamamas\u0131:<\/strong> Kurtarma ortam\u0131 k\u00f6k dosya sistemini otomatik olarak alg\u0131layamazsa, disk b\u00f6l\u00fcmlerini manuel olarak listelemeniz ve do\u011fru b\u00f6l\u00fcm\u00fc belirlemeniz gerekebilir. <code>lsblk<\/code> komutunu kullanarak disk b\u00f6l\u00fcmlerini listeleyin ve k\u00f6k dosya sistemini i\u00e7eren b\u00f6l\u00fcm\u00fc bulun.<\/li>\n<li><strong>LVM Etkinle\u015ftirme Sorunlar\u0131:<\/strong> LVM&#8217;yi etkinle\u015ftirirken bir hata mesaj\u0131 al\u0131rsan\u0131z, LVM&#8217;nin do\u011fru \u015fekilde yap\u0131land\u0131r\u0131ld\u0131\u011f\u0131ndan emin olun. <code>vgscan<\/code> ve <code>vgchange<\/code> komutlar\u0131n\u0131 do\u011fru parametrelerle kulland\u0131\u011f\u0131n\u0131zdan emin olun.<\/li>\n<li><strong>Montaj \u0130\u015flemi Ba\u015far\u0131s\u0131z Olursa:<\/strong> K\u00f6k dosya sistemini montajlarken bir hata mesaj\u0131 al\u0131rsan\u0131z, dosya sisteminin tutarl\u0131 oldu\u011fundan emin olun. <code>fsck<\/code> komutunu kullanarak dosya sistemini kontrol edebilir ve onarabilirsiniz.<\/li>\n<li><strong><code>chroot<\/code> Komutu \u00c7al\u0131\u015fmazsa:<\/strong> <code>chroot<\/code> komutu \u00e7al\u0131\u015fmazsa, k\u00f6k dosya sisteminin do\u011fru \u015fekilde monte edildi\u011finden emin olun. Ayr\u0131ca, kurtarma ortam\u0131n\u0131n <code>chroot<\/code> komutunu destekledi\u011finden emin olun.<\/li>\n<li><strong>Sistem Ba\u015flatma Sorunlar\u0131:<\/strong> Sistemi yeniden ba\u015flatt\u0131ktan sonra bir sorunla kar\u015f\u0131la\u015f\u0131rsan\u0131z, BIOS ayarlar\u0131n\u0131n do\u011fru yap\u0131land\u0131r\u0131ld\u0131\u011f\u0131ndan emin olun. Sanal makinenin CD\/DVD s\u00fcr\u00fcc\u00fcs\u00fcnden ba\u015flat\u0131lmad\u0131\u011f\u0131ndan ve sabit diskten ba\u015flat\u0131ld\u0131\u011f\u0131ndan emin olun.<\/li>\n<\/ul>\n<p><strong>G\u00fcvenlik Notlar\u0131:<\/strong><\/p>\n<ul>\n<li>Kurtarma modunu kullanarak root parolas\u0131n\u0131 s\u0131f\u0131rlad\u0131ktan sonra, sistemin g\u00fcvenli\u011fini sa\u011flamak i\u00e7in ek \u00f6nlemler alman\u0131z \u00f6nemlidir.<\/li>\n<li>Sistemdeki t\u00fcm kullan\u0131c\u0131 hesaplar\u0131n\u0131n parolalar\u0131n\u0131 kontrol edin ve zay\u0131f parolalar\u0131 de\u011fi\u015ftirin.<\/li>\n<li>Sisteme yetkisiz eri\u015fimi engellemek i\u00e7in g\u00fcvenlik duvar\u0131 ayarlar\u0131n\u0131 yap\u0131land\u0131r\u0131n.<\/li>\n<li>Sistem yaz\u0131l\u0131mlar\u0131n\u0131 ve uygulamalar\u0131n\u0131 g\u00fcncel tutun.<\/li>\n<li>Sistem loglar\u0131n\u0131 d\u00fczenli olarak izleyin ve \u015f\u00fcpheli\u6d3b\u52a8 tespit etmeye \u00e7al\u0131\u015f\u0131n.<\/li>\n<\/ul>\n<p>Bu detayl\u0131 rehber sayesinde, kurtarma modu ile AlmaLinux VDS root parolas\u0131n\u0131 s\u0131f\u0131rlama i\u015flemini ba\u015far\u0131yla ger\u00e7ekle\u015ftirebilirsiniz. Unutmay\u0131n, bu i\u015flem s\u0131ras\u0131nda dikkatli olmak ve ad\u0131mlar\u0131 do\u011fru bir \u015fekilde takip etmek, sisteminizin g\u00fcvenli\u011fini ve istikrar\u0131n\u0131 koruman\u0131za yard\u0131mc\u0131 olacakt\u0131r. &#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221;nin bu b\u00f6l\u00fcm\u00fc, size bu konuda kapsaml\u0131 bir bilgi sa\u011flamay\u0131 ama\u00e7lamaktad\u0131r.<\/p>\n<p><strong>Ek Bilgiler ve Kaynaklar:<\/strong><\/p>\n<ul>\n<li><strong>AlmaLinux Resmi Web Sitesi:<\/strong> <a href=\"https:\/\/almalinux.org\/\">https:\/\/almalinux.org\/<\/a><\/li>\n<li><strong>VMware vSphere Documentation:<\/strong> <a href=\"https:\/\/docs.vmware.com\/en\/VMware-vSphere\/index.html\">https:\/\/docs.vmware.com\/en\/VMware-vSphere\/index.html<\/a><\/li>\n<li><strong>Linux Command Line Basics:<\/strong> <a href=\"https:\/\/www.linuxcommand.org\/\">https:\/\/www.linuxcommand.org\/<\/a><\/li>\n<\/ul>\n<p>Bu kaynaklar, AlmaLinux, ESXi ve Linux komut sat\u0131r\u0131 hakk\u0131nda daha fazla bilgi edinmenize yard\u0131mc\u0131 olabilir.<\/p>\n<p>Umar\u0131m bu kapsaml\u0131 rehber, AlmaLinux VDS ESXi ortam\u0131nda root parolas\u0131n\u0131 s\u0131f\u0131rlama konusunda size yard\u0131mc\u0131 olmu\u015ftur. Ba\u015far\u0131lar dilerim!<\/p>\n<h2 id=\"6-g-venlik-i-pu-lar-ve-en-i-yi-uygulamalar\"><span class=\"ez-toc-section\" id=\"6_Guvenlik_Ipuclari_ve_En_Iyi_Uygulamalar\"><\/span>6. G\u00fcvenlik \u0130pu\u00e7lar\u0131 ve En \u0130yi Uygulamalar<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>G\u00fcvenlik, herhangi bir sistemin, \u00f6zellikle de AlmaLinux VDS ve ESXi ortamlar\u0131n\u0131n ayr\u0131lmaz bir par\u00e7as\u0131d\u0131r. Bu b\u00f6l\u00fcm, &#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221; kapsam\u0131nda, sisteminizi potansiyel tehditlere kar\u015f\u0131 koruman\u0131za yard\u0131mc\u0131 olacak bir dizi g\u00fcvenlik ipucu ve en iyi uygulamay\u0131 sunmaktad\u0131r. K\u00f6k parolas\u0131n\u0131n g\u00fcvenli\u011finin \u00f6nemi vurgulanarak, bu b\u00f6l\u00fcm, parola y\u00f6netimi, eri\u015fim kontrol\u00fc, g\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131, sistem g\u00fcncellemeleri ve log izleme gibi \u00e7e\u015fitli alanlarda pratik rehberlik sa\u011flar.<\/p>\n<p><strong>6.1 G\u00fc\u00e7l\u00fc ve Benzersiz Parolalar Olu\u015fturma<\/strong><\/p>\n<p>G\u00fcvenli bir sistemin temel ta\u015f\u0131, g\u00fc\u00e7l\u00fc ve benzersiz parolalar kullanmakt\u0131r. K\u00f6k parolas\u0131, sistemin en hassas hesab\u0131na eri\u015fim sa\u011flad\u0131\u011f\u0131 i\u00e7in \u00f6zellikle \u00f6nemlidir. Zay\u0131f veya kolayca tahmin edilebilir bir parola, sisteminizi yetkisiz eri\u015fime a\u00e7\u0131k hale getirebilir.<\/p>\n<ul>\n<li><strong>Parola Uzunlu\u011fu:<\/strong> Parola ne kadar uzun olursa, k\u0131r\u0131lmas\u0131 o kadar zor olur. En az 12 karakter uzunlu\u011funda bir parola kullanman\u0131z \u00f6nerilir. Daha uzun parolalar, daha da fazla g\u00fcvenlik sa\u011flar.<\/li>\n<li><strong>Parola Karma\u015f\u0131kl\u0131\u011f\u0131:<\/strong> Parolan\u0131z, b\u00fcy\u00fck harfler, k\u00fc\u00e7\u00fck harfler, rakamlar ve semboller i\u00e7ermelidir. Bu, parola karma\u015f\u0131kl\u0131\u011f\u0131n\u0131 art\u0131r\u0131r ve olas\u0131 sald\u0131r\u0131lar\u0131 zorla\u015ft\u0131r\u0131r.<\/li>\n<li><strong>Tahmin Edilebilirlikten Ka\u00e7\u0131nma:<\/strong> Parolan\u0131zda ki\u015fisel bilgilerinizi (do\u011fum tarihi, ad\u0131n\u0131z, evcil hayvan\u0131n\u0131z\u0131n ad\u0131 vb.) veya s\u00f6zl\u00fck kelimelerini kullanmaktan ka\u00e7\u0131n\u0131n. Bu t\u00fcr bilgiler, sald\u0131rganlar taraf\u0131ndan kolayca tahmin edilebilir.<\/li>\n<li><strong>Rastgele Parola \u00dcreticileri:<\/strong> Parola olu\u015fturmak i\u00e7in rastgele parola \u00fcreticileri kullanabilirsiniz. Bu ara\u00e7lar, g\u00fc\u00e7l\u00fc ve benzersiz parolalar olu\u015fturman\u0131za yard\u0131mc\u0131 olur. \u00d6rne\u011fin, Linux komut sat\u0131r\u0131nda <code>openssl rand -base64 16<\/code> komutunu kullanarak 16 karakterlik rastgele bir parola olu\u015fturabilirsiniz.<\/li>\n<li><strong>Parola Y\u00f6neticileri:<\/strong> Parolalar\u0131n\u0131z\u0131 g\u00fcvenli bir \u015fekilde saklamak i\u00e7in bir parola y\u00f6neticisi kullanabilirsiniz. Parola y\u00f6neticileri, karma\u015f\u0131k parolalar olu\u015fturman\u0131za, parolalar\u0131n\u0131z\u0131 g\u00fcvenli bir \u015fekilde saklaman\u0131za ve farkl\u0131 web siteleri ve uygulamalar i\u00e7in benzersiz parolalar kullanman\u0131za olanak tan\u0131r. \u00d6rne\u011fin, LastPass, 1Password veya Bitwarden gibi pop\u00fcler parola y\u00f6neticilerini kullanabilirsiniz.<\/li>\n<\/ul>\n<p><strong>\u00d6rnek:<\/strong><\/p>\n<ul>\n<li>Zay\u0131f Parola: <code>123456<\/code>, <code>password<\/code>, <code>dogumtarihi<\/code><\/li>\n<li>G\u00fc\u00e7l\u00fc Parola: <code>aL9#pQzR7*vX2yW<\/code>, <code>bC5&amp;gTjE8!uK4rN<\/code>, <code>dF1@xRsO6^hP3qZ<\/code><\/li>\n<\/ul>\n<p><strong>6.2 D\u00fczenli Parola De\u011fi\u015fiklikleri Yapma<\/strong><\/p>\n<p>Parolalar\u0131n\u0131z\u0131 d\u00fczenli olarak de\u011fi\u015ftirmek, sistem g\u00fcvenli\u011finizi art\u0131rman\u0131n \u00f6nemli bir yoludur. Parola de\u011fi\u015fikli\u011fi s\u0131kl\u0131\u011f\u0131, sisteminizin hassasiyetine ve risk de\u011ferlendirmesine ba\u011fl\u0131d\u0131r.<\/p>\n<ul>\n<li><strong>Parola De\u011fi\u015fikli\u011fi S\u0131kl\u0131\u011f\u0131:<\/strong> K\u00f6k parolas\u0131 gibi hassas parolalar i\u00e7in her 30-90 g\u00fcnde bir parola de\u011fi\u015fikli\u011fi yapman\u0131z \u00f6nerilir. Daha az hassas parolalar i\u00e7in parola de\u011fi\u015fikli\u011fi s\u0131kl\u0131\u011f\u0131 daha uzun olabilir (\u00f6rne\u011fin, 6 ayda bir).<\/li>\n<li><strong>Parola De\u011fi\u015fikli\u011fi Politikalar\u0131:<\/strong> Kurumunuz i\u00e7in bir parola de\u011fi\u015fikli\u011fi politikas\u0131 olu\u015fturun ve t\u00fcm kullan\u0131c\u0131lar\u0131n bu politikaya uymas\u0131n\u0131 sa\u011flay\u0131n.<\/li>\n<li><strong>Parola Ge\u00e7mi\u015fi:<\/strong> Yeni parolalar\u0131n\u0131z\u0131n, daha \u00f6nce kulland\u0131\u011f\u0131n\u0131z parolalardan farkl\u0131 oldu\u011fundan emin olun. Parola y\u00f6netimi ara\u00e7lar\u0131, parola ge\u00e7mi\u015fini takip etmenize ve tekrar eden parolalar kullanmaktan ka\u00e7\u0131nman\u0131za yard\u0131mc\u0131 olabilir.<\/li>\n<li><strong>Otomatik Parola De\u011fi\u015fikli\u011fi:<\/strong> Parola y\u00f6netimi ara\u00e7lar\u0131, parolalar\u0131 otomatik olarak de\u011fi\u015ftirebilir. Bu, parola de\u011fi\u015fikli\u011fi i\u015flemini kolayla\u015ft\u0131r\u0131r ve kullan\u0131c\u0131lar\u0131n parolalar\u0131n\u0131 d\u00fczenli olarak de\u011fi\u015ftirmelerini sa\u011flar.<\/li>\n<\/ul>\n<p><strong>\u00d6rnek:<\/strong><\/p>\n<ul>\n<li>Bir \u015firketin IT departman\u0131, t\u00fcm kullan\u0131c\u0131lar\u0131n parolalar\u0131n\u0131 her 60 g\u00fcnde bir de\u011fi\u015ftirmesini zorunlu k\u0131lar. Ayr\u0131ca, yeni parolalar\u0131n son 3 paroladan farkl\u0131 olmas\u0131 gerekmektedir.<\/li>\n<\/ul>\n<p><strong>6.3 \u0130ki Fakt\u00f6rl\u00fc Kimlik Do\u011frulama (2FA) Kullanma<\/strong><\/p>\n<p>\u0130ki fakt\u00f6rl\u00fc kimlik do\u011frulama (2FA), kullan\u0131c\u0131 ad\u0131n\u0131z\u0131 ve parolan\u0131z\u0131 girdikten sonra ek bir do\u011frulama ad\u0131m\u0131 gerektiren bir g\u00fcvenlik \u00f6nlemidir. 2FA, sisteminizi yetkisiz eri\u015fime kar\u015f\u0131 \u00f6nemli \u00f6l\u00e7\u00fcde koruyabilir, \u00e7\u00fcnk\u00fc sald\u0131rganlar\u0131n sadece parolan\u0131za sahip olmas\u0131 yeterli olmayacakt\u0131r.<\/p>\n<ul>\n<li><strong>2FA Y\u00f6ntemleri:<\/strong>\n<ul>\n<li><strong>SMS Kodu:<\/strong> Sistem, cep telefonunuza bir SMS kodu g\u00f6nderir ve bu kodu giri\u015f yaparken girmeniz gerekir.<\/li>\n<li><strong>E-posta Kodu:<\/strong> Sistem, e-posta adresinize bir e-posta kodu g\u00f6nderir ve bu kodu giri\u015f yaparken girmeniz gerekir.<\/li>\n<li><strong>Kimlik Do\u011frulama Uygulamas\u0131:<\/strong> Google Authenticator, Authy veya Microsoft Authenticator gibi bir kimlik do\u011frulama uygulamas\u0131 kullanabilirsiniz. Bu uygulamalar, belirli aral\u0131klarla de\u011fi\u015fen benzersiz kodlar \u00fcretir.<\/li>\n<li><strong>Donan\u0131m Anahtar\u0131:<\/strong> YubiKey veya Titan Security Key gibi bir donan\u0131m anahtar\u0131 kullanabilirsiniz. Bu anahtarlar, USB veya NFC arac\u0131l\u0131\u011f\u0131yla bilgisayar\u0131n\u0131za ba\u011flan\u0131r ve giri\u015f yaparken fiziksel olarak takman\u0131z gerekir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>2FA&#8217;y\u0131 Etkinle\u015ftirme:<\/strong>\n<ul>\n<li>AlmaLinux VDS ve ESXi ortamlar\u0131nda 2FA&#8217;y\u0131 etkinle\u015ftirmek i\u00e7in, sisteminizin kimlik do\u011frulama mekanizmas\u0131n\u0131 yap\u0131land\u0131rman\u0131z gerekir.<\/li>\n<li>SSH eri\u015fimi i\u00e7in 2FA&#8217;y\u0131 etkinle\u015ftirmek i\u00e7in, Google Authenticator veya YubiKey gibi ara\u00e7lar\u0131 kullanabilirsiniz.<\/li>\n<li>ESXi aray\u00fcz\u00fc i\u00e7in 2FA&#8217;y\u0131 etkinle\u015ftirmek i\u00e7in, VMware&#8217;in \u00f6nerdi\u011fi g\u00fcvenlik \u00f6nlemlerini takip edebilirsiniz.<\/li>\n<\/ul>\n<\/li>\n<li><strong>2FA&#8217;n\u0131n \u00d6nemi:<\/strong>\n<ul>\n<li>2FA, sisteminizi parola tabanl\u0131 sald\u0131r\u0131lara kar\u015f\u0131 korur.<\/li>\n<li>2FA, kimlik av\u0131 sald\u0131r\u0131lar\u0131na kar\u015f\u0131 ek bir koruma katman\u0131 sa\u011flar.<\/li>\n<li>2FA, sisteminizin g\u00fcvenli\u011fini \u00f6nemli \u00f6l\u00e7\u00fcde art\u0131r\u0131r.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>\u00d6rnek:<\/strong><\/p>\n<ul>\n<li>Bir sistem y\u00f6neticisi, AlmaLinux VDS&#8217;sine SSH ile eri\u015fmek i\u00e7in Google Authenticator uygulamas\u0131n\u0131 kullanarak 2FA&#8217;y\u0131 etkinle\u015ftirir. Giri\u015f yapmak i\u00e7in kullan\u0131c\u0131 ad\u0131n\u0131 ve parolas\u0131n\u0131 girdikten sonra, Google Authenticator uygulamas\u0131nda g\u00f6r\u00fcnt\u00fclenen kodu girmesi gerekir.<\/li>\n<\/ul>\n<p><strong>6.4 SSH Eri\u015fimi G\u00fcvenli\u011fini Sa\u011flama (Port De\u011fi\u015fikli\u011fi, Anahtar Tabanl\u0131 Kimlik Do\u011frulama)<\/strong><\/p>\n<p>SSH (Secure Shell), uzak sunuculara g\u00fcvenli bir \u015fekilde eri\u015fmek i\u00e7in kullan\u0131lan yayg\u0131n bir protokold\u00fcr. SSH eri\u015fiminin g\u00fcvenli\u011fini sa\u011flamak, sisteminizi yetkisiz eri\u015fime kar\u015f\u0131 koruman\u0131n \u00f6nemli bir yoludur.<\/p>\n<ul>\n<li><strong>Port De\u011fi\u015fikli\u011fi:<\/strong>\n<ul>\n<li>Varsay\u0131lan SSH portu (22) genellikle sald\u0131rganlar taraf\u0131ndan hedef al\u0131n\u0131r. SSH portunu de\u011fi\u015ftirerek, sisteminizi otomatik sald\u0131r\u0131lara kar\u015f\u0131 koruyabilirsiniz.<\/li>\n<li>SSH portunu de\u011fi\u015ftirmek i\u00e7in, <code>\/etc\/ssh\/sshd_config<\/code> dosyas\u0131n\u0131 d\u00fczenleyin ve <code>Port<\/code> direktifini istedi\u011finiz bir port numaras\u0131yla de\u011fi\u015ftirin. \u00d6rne\u011fin, <code>Port 2222<\/code> sat\u0131r\u0131n\u0131 ekleyerek SSH portunu 2222&#8217;ye de\u011fi\u015ftirebilirsiniz.<\/li>\n<li>Portu de\u011fi\u015ftirdikten sonra, SSH servisini yeniden ba\u015flatman\u0131z gerekir: <code>systemctl restart sshd<\/code>.<\/li>\n<li>G\u00fcvenlik duvar\u0131n\u0131z\u0131, yeni SSH portuna izin verecek \u015fekilde yap\u0131land\u0131rmay\u0131 unutmay\u0131n.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Anahtar Tabanl\u0131 Kimlik Do\u011frulama:<\/strong>\n<ul>\n<li>Anahtar tabanl\u0131 kimlik do\u011frulama, parola tabanl\u0131 kimlik do\u011frulamaya g\u00f6re daha g\u00fcvenli bir alternatiftir. Anahtar tabanl\u0131 kimlik do\u011frulama, \u00f6zel bir anahtar ve genel bir anahtar kullan\u0131r. \u00d6zel anahtar, bilgisayar\u0131n\u0131zda saklan\u0131r ve genel anahtar, sunucuda saklan\u0131r. Giri\u015f yapmak i\u00e7in, \u00f6zel anahtar\u0131n\u0131z\u0131n sunucudaki genel anahtarla e\u015fle\u015fmesi gerekir.<\/li>\n<li>Anahtar tabanl\u0131 kimlik do\u011frulamay\u0131 etkinle\u015ftirmek i\u00e7in:\n<ol>\n<li>Bilgisayar\u0131n\u0131zda bir SSH anahtar \u00e7ifti olu\u015fturun: <code>ssh-keygen -t rsa -b 4096<\/code>.<\/li>\n<li>Genel anahtar\u0131n\u0131z\u0131 sunucuya kopyalay\u0131n: <code>ssh-copy-id user@server<\/code>.<\/li>\n<li>Sunucudaki <code>\/etc\/ssh\/sshd_config<\/code> dosyas\u0131nda <code>PasswordAuthentication no<\/code> sat\u0131r\u0131n\u0131 ekleyerek parola tabanl\u0131 kimlik do\u011frulamay\u0131 devre d\u0131\u015f\u0131 b\u0131rak\u0131n.<\/li>\n<li>SSH servisini yeniden ba\u015flat\u0131n: <code>systemctl restart sshd<\/code>.<\/li>\n<\/ol>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong><code>PermitRootLogin<\/code> Direktifi:<\/strong>\n<ul>\n<li><code>\/etc\/ssh\/sshd_config<\/code> dosyas\u0131nda <code>PermitRootLogin no<\/code> sat\u0131r\u0131n\u0131 ekleyerek root kullan\u0131c\u0131s\u0131n\u0131n do\u011frudan SSH ile giri\u015f yapmas\u0131n\u0131 engelleyin. Bu, sisteminizi yetkisiz root eri\u015fimine kar\u015f\u0131 korur. Kullan\u0131c\u0131lar \u00f6nce normal bir kullan\u0131c\u0131 hesab\u0131 ile giri\u015f yapmal\u0131 ve ard\u0131ndan <code>su<\/code> veya <code>sudo<\/code> komutlar\u0131n\u0131 kullanarak root yetkilerine y\u00fckselmelidir.<\/li>\n<\/ul>\n<\/li>\n<li><strong><code>AllowUsers<\/code> ve <code>DenyUsers<\/code> Direktifleri:<\/strong>\n<ul>\n<li><code>\/etc\/ssh\/sshd_config<\/code> dosyas\u0131nda <code>AllowUsers<\/code> ve <code>DenyUsers<\/code> direktiflerini kullanarak, hangi kullan\u0131c\u0131lar\u0131n SSH ile giri\u015f yapabilece\u011fini ve hangilerinin yapamayaca\u011f\u0131n\u0131 belirleyebilirsiniz. \u00d6rne\u011fin, <code>AllowUsers kullanici1 kullanici2<\/code> sat\u0131r\u0131, sadece <code>kullanici1<\/code> ve <code>kullanici2<\/code> kullan\u0131c\u0131lar\u0131n\u0131n SSH ile giri\u015f yapmas\u0131na izin verir.<\/li>\n<\/ul>\n<\/li>\n<li><strong><code>MaxAuthTries<\/code> Direktifi:<\/strong>\n<ul>\n<li><code>\/etc\/ssh\/sshd_config<\/code> dosyas\u0131nda <code>MaxAuthTries<\/code> direktifini kullanarak, ba\u015far\u0131s\u0131z giri\u015f denemelerinin say\u0131s\u0131n\u0131 s\u0131n\u0131rlayabilirsiniz. Bu, kaba kuvvet sald\u0131r\u0131lar\u0131n\u0131 engellemeye yard\u0131mc\u0131 olur. \u00d6rne\u011fin, <code>MaxAuthTries 3<\/code> sat\u0131r\u0131, kullan\u0131c\u0131lar\u0131n sadece 3 kez parola girmesine izin verir.<\/li>\n<\/ul>\n<\/li>\n<li><strong><code>TCPKeepAlive<\/code> ve <code>ClientAliveInterval<\/code> Direktifleri:<\/strong>\n<ul>\n<li><code>\/etc\/ssh\/sshd_config<\/code> dosyas\u0131nda <code>TCPKeepAlive yes<\/code> ve <code>ClientAliveInterval 300<\/code> direktiflerini kullanarak, SSH ba\u011flant\u0131lar\u0131n\u0131n aktif kalmas\u0131n\u0131 sa\u011flayabilirsiniz. Bu, uzun s\u00fcreli inaktif ba\u011flant\u0131lar\u0131n otomatik olarak kesilmesini engeller.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>\u00d6rnek:<\/strong><\/p>\n<ul>\n<li>Bir sistem y\u00f6neticisi, AlmaLinux VDS&#8217;sinin SSH portunu 22&#8217;den 2222&#8217;ye de\u011fi\u015ftirir ve anahtar tabanl\u0131 kimlik do\u011frulamay\u0131 etkinle\u015ftirir. Ayr\u0131ca, root kullan\u0131c\u0131s\u0131n\u0131n do\u011frudan SSH ile giri\u015f yapmas\u0131n\u0131 engeller ve ba\u015far\u0131s\u0131z giri\u015f denemelerinin say\u0131s\u0131n\u0131 3 ile s\u0131n\u0131rlar.<\/li>\n<\/ul>\n<p><strong>6.5 Yetkisiz Eri\u015fimleri Engelleme (G\u00fcvenlik Duvar\u0131 Yap\u0131land\u0131rmas\u0131)<\/strong><\/p>\n<p>G\u00fcvenlik duvar\u0131, sisteminize gelen ve giden a\u011f trafi\u011fini kontrol eden bir g\u00fcvenlik mekanizmas\u0131d\u0131r. G\u00fcvenlik duvar\u0131 yap\u0131land\u0131rmas\u0131, yetkisiz eri\u015fimleri engellemek ve sisteminizi potansiyel tehditlere kar\u015f\u0131 korumak i\u00e7in \u00f6nemlidir.<\/p>\n<ul>\n<li><strong><code>firewalld<\/code> Kullan\u0131m\u0131:<\/strong>\n<ul>\n<li>AlmaLinux&#8217;da varsay\u0131lan g\u00fcvenlik duvar\u0131 uygulamas\u0131 <code>firewalld<\/code>&#8216;dir. <code>firewalld<\/code>, zone&#8217;lar (b\u00f6lgeler) kullanarak a\u011f trafi\u011fini y\u00f6netmenize olanak tan\u0131r.<\/li>\n<li><code>firewalld<\/code>&#8216;\u0131 ba\u015flatmak, durdurmak ve durumunu kontrol etmek i\u00e7in a\u015fa\u011f\u0131daki komutlar\u0131 kullanabilirsiniz:\n<ul>\n<li><code>systemctl start firewalld<\/code> (G\u00fcvenlik duvar\u0131n\u0131 ba\u015flat\u0131r)<\/li>\n<li><code>systemctl stop firewalld<\/code> (G\u00fcvenlik duvar\u0131n\u0131 durdurur)<\/li>\n<li><code>systemctl status firewalld<\/code> (G\u00fcvenlik duvar\u0131n\u0131n durumunu g\u00f6r\u00fcnt\u00fcler)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Temel G\u00fcvenlik Duvar\u0131 Kurallar\u0131:<\/strong>\n<ul>\n<li><strong>Varsay\u0131lan Politikay\u0131 Ayarlama:<\/strong> G\u00fcvenlik duvar\u0131n\u0131n varsay\u0131lan politikas\u0131n\u0131 &#8220;deny&#8221; (reddet) olarak ayarlay\u0131n. Bu, a\u00e7\u0131k\u00e7a izin vermedi\u011finiz t\u00fcm trafi\u011fin engellenece\u011fi anlam\u0131na gelir.\n<pre><code class=\"lang-bash\">firewall-cmd --<span class=\"hljs-built_in\">set<\/span>-<span class=\"hljs-keyword\">default<\/span>-zone=<span class=\"hljs-built_in\">drop<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li><strong>Gerekli Servislere \u0130zin Verme:<\/strong> Sadece gerekli olan servislere (\u00f6rne\u011fin, SSH, HTTP, HTTPS) izin verin.\n<pre><code class=\"lang-bash\">firewall-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> --zone=public --add-service=ssh --permanent\r\n<\/span>firewall-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> --zone=public --add-service=http --permanent\r\n<\/span>firewall-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> --zone=public --add-service=https --permanent\r\n<\/span>firewall-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> --reload<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li><strong>Belirli Portlara \u0130zin Verme:<\/strong> Belirli portlara (\u00f6rne\u011fin, 2222) izin vermek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\">firewall-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> --zone=public --add-port=2222\/tcp --permanent\r\n<\/span>firewall-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> --reload<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li><strong>Belirli IP Adreslerine \u0130zin Verme:<\/strong> Belirli IP adreslerinden gelen trafi\u011fe izin vermek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\">firewall-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> --zone=public --add-source=192.168.1.100 --permanent\r\n<\/span>firewall-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> --reload<\/span>\r\n<\/code><\/pre>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Zone&#8217;lar\u0131 Kullanma:<\/strong>\n<ul>\n<li><code>firewalld<\/code>, farkl\u0131 a\u011f ortamlar\u0131 i\u00e7in farkl\u0131 zone&#8217;lar sunar. \u00d6rne\u011fin, <code>public<\/code> zone&#8217;u genel a\u011flar i\u00e7in, <code>private<\/code> zone&#8217;u \u00f6zel a\u011flar i\u00e7in kullan\u0131l\u0131r.<\/li>\n<li>Zone&#8217;lar\u0131 kullanarak, farkl\u0131 a\u011f ortamlar\u0131 i\u00e7in farkl\u0131 g\u00fcvenlik duvar\u0131 kurallar\u0131 uygulayabilirsiniz.<\/li>\n<\/ul>\n<\/li>\n<li><strong><code>Rich Rules<\/code> Kullanma:<\/strong>\n<ul>\n<li><code>firewalld<\/code>, <code>rich rules<\/code> ad\u0131 verilen daha karma\u015f\u0131k g\u00fcvenlik duvar\u0131 kurallar\u0131n\u0131 tan\u0131mlaman\u0131za olanak tan\u0131r. <code>Rich rules<\/code> kullanarak, belirli kaynak IP adreslerinden gelen, belirli portlara y\u00f6nelik trafi\u011fi engelleme veya izin verme gibi daha detayl\u0131 kurallar olu\u015fturabilirsiniz.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>\u00d6rnek:<\/strong><\/p>\n<ul>\n<li>Bir sistem y\u00f6neticisi, AlmaLinux VDS&#8217;sinin g\u00fcvenlik duvar\u0131n\u0131 yap\u0131land\u0131rarak sadece SSH (2222 portu), HTTP (80 portu) ve HTTPS (443 portu) servislerine izin verir. Ayr\u0131ca, \u015firket a\u011f\u0131ndan gelen t\u00fcm trafi\u011fe izin verir ve di\u011fer t\u00fcm trafi\u011fi engeller.<\/li>\n<\/ul>\n<p><strong>6.6 Sistem Loglar\u0131n\u0131 D\u00fczenli Olarak \u0130zleme<\/strong><\/p>\n<p>Sistem loglar\u0131n\u0131 d\u00fczenli olarak izlemek, sisteminizdeki g\u00fcvenlik olaylar\u0131n\u0131 tespit etmenize ve olas\u0131 sald\u0131r\u0131lara kar\u015f\u0131 \u00f6nlem alman\u0131za olanak tan\u0131r.<\/p>\n<ul>\n<li><strong>Log Dosyalar\u0131n\u0131 \u0130zleme:<\/strong>\n<ul>\n<li><code>\/var\/log\/<\/code> dizininde bulunan \u00e7e\u015fitli log dosyalar\u0131n\u0131 (\u00f6rne\u011fin, <code>\/var\/log\/auth.log<\/code>, <code>\/var\/log\/syslog<\/code>, <code>\/var\/log\/messages<\/code>) d\u00fczenli olarak inceleyin.<\/li>\n<li><code>tail -f<\/code> komutunu kullanarak log dosyalar\u0131n\u0131 ger\u00e7ek zamanl\u0131 olarak izleyebilirsiniz.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Log Y\u00f6netim Ara\u00e7lar\u0131:<\/strong>\n<ul>\n<li>Logwatch, Logcheck veya Graylog gibi log y\u00f6netim ara\u00e7lar\u0131 kullanarak, log dosyalar\u0131n\u0131 otomatik olarak analiz edebilir ve \u00f6nemli olaylar\u0131 tespit edebilirsiniz.<\/li>\n<li>Bu ara\u00e7lar, log dosyalar\u0131ndaki hatalar\u0131, uyar\u0131lar\u0131 ve g\u00fcvenlik olaylar\u0131n\u0131 filtreleyebilir ve size e-posta veya di\u011fer bildirim y\u00f6ntemleriyle bildirim g\u00f6nderebilir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Log Rotasyonu:<\/strong>\n<ul>\n<li>Log dosyalar\u0131n\u0131n b\u00fcy\u00fckl\u00fc\u011f\u00fcn\u00fc kontrol alt\u0131nda tutmak i\u00e7in log rotasyonu kullan\u0131n. Log rotasyonu, eski log dosyalar\u0131n\u0131 otomatik olarak s\u0131k\u0131\u015ft\u0131r\u0131r ve siler.<\/li>\n<li><code>logrotate<\/code> arac\u0131, log rotasyonu i\u00e7in yayg\u0131n olarak kullan\u0131lan bir ara\u00e7t\u0131r. <code>\/etc\/logrotate.conf<\/code> dosyas\u0131n\u0131 d\u00fczenleyerek log rotasyonunu yap\u0131land\u0131rabilirsiniz.<\/li>\n<\/ul>\n<\/li>\n<li><strong>G\u00fcvenlik Olaylar\u0131n\u0131 \u0130zleme:<\/strong>\n<ul>\n<li>A\u015fa\u011f\u0131daki g\u00fcvenlik olaylar\u0131n\u0131 izlemeye \u00f6zellikle dikkat edin:\n<ul>\n<li>Ba\u015far\u0131s\u0131z giri\u015f denemeleri<\/li>\n<li>Yetkisiz dosya eri\u015fimi<\/li>\n<li>Sistem hatalar\u0131<\/li>\n<li>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m tespitleri<\/li>\n<li>A\u011f trafi\u011fi anormallikleri<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>\u00d6rnek:<\/strong><\/p>\n<ul>\n<li>Bir sistem y\u00f6neticisi, Logwatch arac\u0131n\u0131 kullanarak AlmaLinux VDS&#8217;sinin log dosyalar\u0131n\u0131 g\u00fcnl\u00fck olarak analiz eder. Logwatch, ba\u015far\u0131s\u0131z giri\u015f denemelerini ve yetkisiz dosya eri\u015fimlerini tespit eder ve sistem y\u00f6neticisine e-posta ile bildirim g\u00f6nderir.<\/li>\n<\/ul>\n<p><strong>6.7 Sistem G\u00fcncellemelerini D\u00fczenli Olarak Yapma<\/strong><\/p>\n<p>Sistem g\u00fcncellemelerini d\u00fczenli olarak yapmak, sisteminizi bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131na kar\u015f\u0131 koruman\u0131n en \u00f6nemli yollar\u0131ndan biridir.<\/p>\n<ul>\n<li><strong><code>yum<\/code> veya <code>dnf<\/code> Kullan\u0131m\u0131:<\/strong>\n<ul>\n<li>AlmaLinux&#8217;da paket y\u00f6netimi i\u00e7in <code>yum<\/code> veya <code>dnf<\/code> ara\u00e7lar\u0131n\u0131 kullanabilirsiniz.<\/li>\n<li>Sistem g\u00fcncellemelerini yapmak i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">dnf update<\/span>\r\n<\/code><\/pre>\n<p>Bu komut, sistemdeki t\u00fcm paketleri en son s\u00fcr\u00fcmlerine g\u00fcncelleyecektir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Otomatik G\u00fcncellemeler:<\/strong>\n<ul>\n<li>Sistem g\u00fcncellemelerini otomatik olarak yapmak i\u00e7in, <code>yum-cron<\/code> veya <code>dnf-automatic<\/code> ara\u00e7lar\u0131n\u0131 kullanabilirsiniz.<\/li>\n<li>Bu ara\u00e7lar, sisteminizi d\u00fczenli aral\u0131klarla g\u00fcncelleyecek ve sizi yeni g\u00fcvenlik a\u00e7\u0131klar\u0131na kar\u015f\u0131 koruyacakt\u0131r.<\/li>\n<\/ul>\n<\/li>\n<li><strong>G\u00fcvenlik G\u00fcncellemelerine \u00d6ncelik Verme:<\/strong>\n<ul>\n<li>G\u00fcvenlik g\u00fcncellemelerini m\u00fcmk\u00fcn olan en k\u0131sa s\u00fcrede yapmaya \u00f6zen g\u00f6sterin. G\u00fcvenlik g\u00fcncellemeleri, sisteminizdeki bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kapat\u0131r ve sizi potansiyel sald\u0131r\u0131lara kar\u015f\u0131 korur.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Yedekleme:<\/strong>\n<ul>\n<li>Sistem g\u00fcncellemelerini yapmadan \u00f6nce, \u00f6nemli verilerinizi yedeklemeniz \u00f6nerilir. Bu, g\u00fcncelleme s\u0131ras\u0131nda bir sorun olu\u015fmas\u0131 durumunda verilerinizi kurtarman\u0131za olanak tan\u0131r.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>\u00d6rnek:<\/strong><\/p>\n<ul>\n<li>Bir sistem y\u00f6neticisi, <code>dnf-automatic<\/code> arac\u0131n\u0131 kullanarak AlmaLinux VDS&#8217;sini haftal\u0131k olarak otomatik olarak g\u00fcnceller. Ayr\u0131ca, g\u00fcvenlik g\u00fcncellemeleri yay\u0131nland\u0131\u011f\u0131nda sistem y\u00f6neticisine e-posta ile bildirim g\u00f6nderilir.<\/li>\n<\/ul>\n<p><strong>6.8 Gereksiz Servisleri Devre D\u0131\u015f\u0131 B\u0131rakma<\/strong><\/p>\n<p>Gereksiz servisleri devre d\u0131\u015f\u0131 b\u0131rakmak, sisteminizin sald\u0131r\u0131 y\u00fczeyini azaltman\u0131n ve g\u00fcvenli\u011fini art\u0131rman\u0131n etkili bir yoludur.<\/p>\n<ul>\n<li><strong>Aktif Servisleri Listeleme:<\/strong>\n<ul>\n<li>Sisteminizde \u00e7al\u0131\u015fan aktif servisleri listelemek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-string\">systemctl <\/span><span class=\"hljs-built_in\">list-units<\/span> <span class=\"hljs-built_in\">--type=service<\/span> <span class=\"hljs-built_in\">--state=running<\/span>\r\n<\/code><\/pre>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Gereksiz Servisleri Belirleme:<\/strong>\n<ul>\n<li>Listelenen servisleri inceleyin ve gereksiz olanlar\u0131 belirleyin. \u00d6rne\u011fin, bir web sunucusu \u00e7al\u0131\u015ft\u0131rm\u0131yorsan\u0131z, HTTP ve HTTPS servislerini devre d\u0131\u015f\u0131 b\u0131rakabilirsiniz.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Servisleri Devre D\u0131\u015f\u0131 B\u0131rakma:<\/strong>\n<ul>\n<li>Gereksiz servisleri devre d\u0131\u015f\u0131 b\u0131rakmak i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\">systemctl disable <span class=\"hljs-tag\">&lt;<span class=\"hljs-name\">servis_adi<\/span>&gt;<\/span>\r\n<\/code><\/pre>\n<ul>\n<li><code>&lt;servis_adi&gt;<\/code>: Devre d\u0131\u015f\u0131 b\u0131rakmak istedi\u011finiz servisin ad\u0131.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Servisleri Durdurma:<\/strong>\n<ul>\n<li>Servisleri devre d\u0131\u015f\u0131 b\u0131rakt\u0131ktan sonra, durdurmak i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\">systemctl <span class=\"hljs-keyword\">stop<\/span> <span class=\"hljs-symbol\">&lt;servis_adi&gt;<\/span>\r\n<\/code><\/pre>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>\u00d6rnek:<\/strong><\/p>\n<ul>\n<li>Bir sistem y\u00f6neticisi, AlmaLinux VDS&#8217;sinde \u00e7al\u0131\u015fan aktif servisleri listeler ve Postfix (e-posta sunucusu) servisinin gereksiz oldu\u011funu belirler. Sistem y\u00f6neticisi, Postfix servisini devre d\u0131\u015f\u0131 b\u0131rak\u0131r ve durdurur.<\/li>\n<\/ul>\n<p><strong>6.9 Dosya Sistemi \u0130zinlerini Kontrol Etme<\/strong><\/p>\n<p>Dosya sistemi izinlerini kontrol etmek, sisteminizdeki dosyalara ve dizinlere yetkisiz eri\u015fimi engellemek i\u00e7in \u00f6nemlidir.<\/p>\n<ul>\n<li><strong><code>chmod<\/code> ve <code>chown<\/code> Komutlar\u0131:<\/strong>\n<ul>\n<li><code>chmod<\/code> komutu, dosya ve dizinlerin izinlerini de\u011fi\u015ftirmek i\u00e7in kullan\u0131l\u0131r.<\/li>\n<li><code>chown<\/code> komutu, dosya ve dizinlerin sahipli\u011fini de\u011fi\u015ftirmek i\u00e7in kullan\u0131l\u0131r.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Temel \u0130zin Kurallar\u0131:<\/strong>\n<ul>\n<li>Sadece gerekli olan kullan\u0131c\u0131lara ve gruplara dosya ve dizinlere eri\u015fim izni verin.<\/li>\n<li>Dosyalara ve dizinlere gere\u011finden fazla izin vermekten ka\u00e7\u0131n\u0131n. \u00d6rne\u011fin, bir dosyan\u0131n \u00e7al\u0131\u015ft\u0131r\u0131labilir (executable) olmas\u0131 gerekmiyorsa, \u00e7al\u0131\u015ft\u0131rma iznini kald\u0131r\u0131n.<\/li>\n<li>Hassas dosyalar\u0131n ve dizinlerin izinlerini daha s\u0131k\u0131 bir \u015fekilde kontrol edin.<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u00d6rnekler:<\/strong>\n<ul>\n<li>Bir dosyan\u0131n sadece sahibi taraf\u0131ndan okunabilir ve yaz\u0131labilir olmas\u0131n\u0131 sa\u011flamak i\u00e7in:\n<pre><code class=\"lang-bash\"><span class=\"hljs-selector-tag\">chmod<\/span> 600 <span class=\"hljs-selector-tag\">dosya<\/span><span class=\"hljs-selector-class\">.txt<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li>Bir dizinin sahibi taraf\u0131ndan okunabilir, yaz\u0131labilir ve \u00e7al\u0131\u015ft\u0131r\u0131labilir olmas\u0131n\u0131, grup taraf\u0131ndan okunabilir ve \u00e7al\u0131\u015ft\u0131r\u0131labilir olmas\u0131n\u0131, di\u011fer kullan\u0131c\u0131lar taraf\u0131ndan ise sadece okunabilir olmas\u0131n\u0131 sa\u011flamak i\u00e7in:\n<pre><code class=\"lang-bash\">chmod <span class=\"hljs-number\">755<\/span> dizin\r\n<\/code><\/pre>\n<\/li>\n<li>Bir dosyan\u0131n sahipli\u011fini <code>kullanici1<\/code> kullan\u0131c\u0131s\u0131na ve <code>grup1<\/code> grubuna vermek i\u00e7in:\n<pre><code class=\"lang-bash\"><span class=\"hljs-selector-tag\">chown<\/span> <span class=\"hljs-selector-tag\">kullanici1<\/span><span class=\"hljs-selector-pseudo\">:grup1<\/span> <span class=\"hljs-selector-tag\">dosya<\/span><span class=\"hljs-selector-class\">.txt<\/span>\r\n<\/code><\/pre>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>6.10 SELinux&#8217;u Etkinle\u015ftirme ve Yap\u0131land\u0131rma<\/strong><\/p>\n<p>SELinux (Security-Enhanced Linux), Linux sistemlerinde g\u00fcvenlik politikalar\u0131n\u0131 uygulamak i\u00e7in kullan\u0131lan bir g\u00fcvenlik mod\u00fcl\u00fcd\u00fcr. SELinux&#8217;u etkinle\u015ftirmek ve do\u011fru \u015fekilde yap\u0131land\u0131rmak, sisteminizin g\u00fcvenli\u011fini \u00f6nemli \u00f6l\u00e7\u00fcde art\u0131rabilir.<\/p>\n<ul>\n<li><strong>SELinux&#8217;un Durumunu Kontrol Etme:<\/strong>\n<ul>\n<li>SELinux&#8217;un etkin olup olmad\u0131\u011f\u0131n\u0131 kontrol etmek i\u00e7in a\u015fa\u011f\u0131daki komutu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">getenforce<\/span>\r\n<\/code><\/pre>\n<ul>\n<li><code>Enforcing<\/code>: SELinux etkin ve g\u00fcvenlik politikalar\u0131n\u0131 uyguluyor.<\/li>\n<li><code>Permissive<\/code>: SELinux etkin ancak sadece log tutuyor ve g\u00fcvenlik politikalar\u0131n\u0131 uygulam\u0131yor.<\/li>\n<li><code>Disabled<\/code>: SELinux devre d\u0131\u015f\u0131.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>SELinux&#8217;u Etkinle\u015ftirme:<\/strong>\n<ul>\n<li>SELinux&#8217;u etkinle\u015ftirmek i\u00e7in <code>\/etc\/selinux\/config<\/code> dosyas\u0131n\u0131 d\u00fczenleyin ve <code>SELINUX<\/code> de\u011fi\u015fkenini <code>enforcing<\/code> olarak ayarlay\u0131n:\n<pre><code><span class=\"hljs-attr\">SELINUX<\/span>=enforcing\r\n<\/code><\/pre>\n<\/li>\n<li>Sistemi yeniden ba\u015flat\u0131n.<\/li>\n<\/ul>\n<\/li>\n<li><strong>SELinux Politikalar\u0131n\u0131 Yap\u0131land\u0131rma:<\/strong>\n<ul>\n<li>SELinux, g\u00fcvenlik politikalar\u0131n\u0131 kullanarak sistem kaynaklar\u0131na eri\u015fimi kontrol eder.<\/li>\n<li>SELinux politikalar\u0131n\u0131, sisteminizin ihtiya\u00e7lar\u0131na g\u00f6re yap\u0131land\u0131rabilirsiniz.<\/li>\n<li><code>semanage<\/code> komutu, SELinux politikalar\u0131n\u0131 y\u00f6netmek i\u00e7in kullan\u0131lan bir ara\u00e7t\u0131r.<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u00d6rnekler:<\/strong>\n<ul>\n<li>Bir web sunucusunun <code>\/var\/www\/html<\/code> dizinine yazma izni vermesini sa\u011flamak i\u00e7in:\n<pre><code class=\"lang-bash\">semanage fcontext -a -<span class=\"hljs-built_in\">t<\/span> httpd_sys_content_t <span class=\"hljs-string\">\"\/var\/www\/html(\/.*)?\"<\/span>\r\nrestorecon -Rv \/<span class=\"hljs-built_in\">var<\/span>\/www\/html\r\n<\/code><\/pre>\n<\/li>\n<li>Bir kullan\u0131c\u0131n\u0131n belirli bir porta ba\u011flanmas\u0131na izin vermek i\u00e7in:\n<pre><code class=\"lang-bash\">semanage port -<span class=\"hljs-selector-tag\">a<\/span> -t ssh_port_t -<span class=\"hljs-selector-tag\">p<\/span> tcp <span class=\"hljs-number\">2222<\/span>\r\n<\/code><\/pre>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>6.11 Yedekleme ve Kurtarma Plan\u0131 Olu\u015fturma<\/strong><\/p>\n<p>Yedekleme ve kurtarma plan\u0131 olu\u015fturmak, sisteminizde bir sorun olu\u015fmas\u0131 durumunda verilerinizi koruman\u0131n ve sistemi h\u0131zl\u0131 bir \u015fekilde geri y\u00fcklemenin \u00f6nemli bir yoludur.<\/p>\n<ul>\n<li><strong>Yedekleme Stratejisi Belirleme:<\/strong>\n<ul>\n<li>Hangi verilerin yedeklenmesi gerekti\u011fini belirleyin.<\/li>\n<li>Yedekleme s\u0131kl\u0131\u011f\u0131n\u0131 belirleyin.<\/li>\n<li>Yedekleme ortam\u0131n\u0131 (\u00f6rne\u011fin, harici disk, a\u011f depolama, bulut depolama) belirleyin.<\/li>\n<li>Yedekleme y\u00f6ntemini (\u00f6rne\u011fin, tam yedekleme, art\u0131ml\u0131 yedekleme, diferansiyel yedekleme) belirleyin.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Yedekleme Ara\u00e7lar\u0131:<\/strong>\n<ul>\n<li><code>tar<\/code>, <code>rsync<\/code> veya <code>bacula<\/code> gibi yedekleme ara\u00e7lar\u0131n\u0131 kullanabilirsiniz.<\/li>\n<li>Bulut tabanl\u0131 yedekleme hizmetlerini (\u00f6rne\u011fin, AWS Backup, Azure Backup, Google Cloud Backup) kullanabilirsiniz.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Kurtarma Plan\u0131 Olu\u015fturma:<\/strong>\n<ul>\n<li>Sistemi nas\u0131l geri y\u00fckleyece\u011finizi ad\u0131m ad\u0131m a\u00e7\u0131klayan bir kurtarma plan\u0131 olu\u015fturun.<\/li>\n<li>Kurtarma plan\u0131n\u0131z\u0131 d\u00fczenli olarak test edin.<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u00d6rnek:<\/strong>\n<ul>\n<li>Bir \u015firket, t\u00fcm sunucular\u0131n\u0131n verilerini haftal\u0131k olarak harici bir diske yedekler. Ayr\u0131ca, kritik verileri g\u00fcnl\u00fck olarak bulut depolama hizmetine yedekler. \u015eirketin IT departman\u0131, kurtarma plan\u0131n\u0131 y\u0131lda iki kez test eder.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>6.12 Fiziksel G\u00fcvenli\u011fi Sa\u011flama<\/strong><\/p>\n<p>Sisteminizin fiziksel g\u00fcvenli\u011fini sa\u011flamak, yetkisiz eri\u015fimi engellemek ve donan\u0131m h\u0131rs\u0131zl\u0131\u011f\u0131n\u0131 \u00f6nlemek i\u00e7in \u00f6nemlidir.<\/p>\n<ul>\n<li><strong>Sunucu Odas\u0131 G\u00fcvenli\u011fi:<\/strong>\n<ul>\n<li>Sunucu odas\u0131na sadece yetkili ki\u015filerin eri\u015fmesine izin verin.<\/li>\n<li>Sunucu odas\u0131n\u0131n kap\u0131s\u0131n\u0131 kilitleyin.<\/li>\n<li>Sunucu odas\u0131nda g\u00fcvenlik kameralar\u0131 kullan\u0131n.<\/li>\n<li>Sunucu odas\u0131nda yang\u0131n s\u00f6nd\u00fcrme sistemleri bulundurun.<\/li>\n<li>Sunucu odas\u0131n\u0131n s\u0131cakl\u0131\u011f\u0131n\u0131 ve nemini kontrol alt\u0131nda tutun.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Donan\u0131m H\u0131rs\u0131zl\u0131\u011f\u0131n\u0131 \u00d6nleme:<\/strong>\n<ul>\n<li>Sunucular\u0131 ve di\u011fer donan\u0131mlar\u0131 g\u00fcvenli bir \u015fekilde sabitleyin.<\/li>\n<li>Ta\u015f\u0131nabilir cihazlar\u0131 (\u00f6rne\u011fin, diz\u00fcst\u00fc bilgisayarlar, harici diskler) g\u00fcvenli bir yerde saklay\u0131n.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>6.13 Bilin\u00e7lendirme E\u011fitimleri D\u00fczenleme<\/strong><\/p>\n<p>Kullan\u0131c\u0131lar\u0131n g\u00fcvenlik konusunda bilin\u00e7lendirilmesi, sistem g\u00fcvenli\u011finizi art\u0131rman\u0131n \u00f6nemli bir yoludur.<\/p>\n<ul>\n<li><strong>E\u011fitim Konular\u0131:<\/strong>\n<ul>\n<li>G\u00fc\u00e7l\u00fc parolalar olu\u015fturma<\/li>\n<li>Kimlik av\u0131 sald\u0131r\u0131lar\u0131n\u0131 tan\u0131ma<\/li>\n<li>K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlardan korunma<\/li>\n<li>G\u00fcvenli internet kullan\u0131m\u0131<\/li>\n<li>Veri gizlili\u011fi<\/li>\n<\/ul>\n<\/li>\n<li><strong>E\u011fitim Y\u00f6ntemleri:<\/strong>\n<ul>\n<li>\u00c7evrimi\u00e7i e\u011fitimler<\/li>\n<li>Seminerler<\/li>\n<li>E-postalar<\/li>\n<li>Posterler<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>6.14 En \u0130yi Uygulamalar\u0131 Takip Etme<\/strong><\/p>\n<p>G\u00fcvenlik alan\u0131nda s\u00fcrekli olarak yeni tehditler ve g\u00fcvenlik a\u00e7\u0131klar\u0131 ortaya \u00e7\u0131kmaktad\u0131r. Bu nedenle, g\u00fcvenlik alan\u0131ndaki en iyi uygulamalar\u0131 takip etmek ve sisteminizi s\u00fcrekli olarak g\u00fcncel tutmak \u00f6nemlidir.<\/p>\n<ul>\n<li><strong>G\u00fcvenlik B\u00fcltenlerine Abone Olma:<\/strong>\n<ul>\n<li>AlmaLinux, ESXi ve kulland\u0131\u011f\u0131n\u0131z di\u011fer yaz\u0131l\u0131mlar\u0131n g\u00fcvenlik b\u00fcltenlerine abone olun.<\/li>\n<li>Bu b\u00fcltenler, yeni g\u00fcvenlik a\u00e7\u0131klar\u0131 ve g\u00fcvenlik g\u00fcncellemeleri hakk\u0131nda sizi bilgilendirecektir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>G\u00fcvenlik Konferanslar\u0131na Kat\u0131lma:<\/strong>\n<ul>\n<li>G\u00fcvenlik konferanslar\u0131na kat\u0131larak, g\u00fcvenlik alan\u0131ndaki en son geli\u015fmeleri \u00f6\u011frenebilir ve di\u011fer g\u00fcvenlik uzmanlar\u0131yla ileti\u015fim kurabilirsiniz.<\/li>\n<\/ul>\n<\/li>\n<li><strong>G\u00fcvenlik Bloglar\u0131n\u0131 ve Web Sitelerini Takip Etme:<\/strong>\n<ul>\n<li>G\u00fcvenlik bloglar\u0131n\u0131 ve web sitelerini takip ederek, g\u00fcvenlik alan\u0131ndaki en son haberleri ve trendleri \u00f6\u011frenebilirsiniz.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Bu b\u00f6l\u00fcmde sunulan g\u00fcvenlik ipu\u00e7lar\u0131 ve en iyi uygulamalar\u0131 takip ederek, AlmaLinux VDS ESXi ortam\u0131n\u0131z\u0131n g\u00fcvenli\u011fini \u00f6nemli \u00f6l\u00e7\u00fcde art\u0131rabilirsiniz. Unutmay\u0131n, g\u00fcvenlik s\u00fcrekli bir s\u00fcre\u00e7tir ve sisteminizi d\u00fczenli olarak izlemeniz, g\u00fcncellemeniz ve yap\u0131land\u0131rman\u0131z gerekmektedir. &#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221;nin bu b\u00f6l\u00fcm\u00fc, size bu konuda kapsaml\u0131 bir rehberlik sa\u011flamay\u0131 ama\u00e7lamaktad\u0131r. G\u00fcvenli bir sistem, g\u00fcvenli bir gelecek demektir!<\/p>\n<h2 id=\"7-sorun-giderme-s-k-kar-la-lan-hatalar-ve-z-mleri\"><span class=\"ez-toc-section\" id=\"7_Sorun_Giderme_Sik_Karsilasilan_Hatalar_ve_Cozumleri\"><\/span>7. Sorun Giderme: S\u0131k Kar\u015f\u0131la\u015f\u0131lan Hatalar ve \u00c7\u00f6z\u00fcmleri<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Elbette, i\u015fte &#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221; i\u00e7in 7. b\u00f6l\u00fcm\u00fcn i\u00e7eri\u011fi:<\/p>\n<p><strong>7. Sorun Giderme: S\u0131k Kar\u015f\u0131la\u015f\u0131lan Hatalar ve \u00c7\u00f6z\u00fcmleri<\/strong><\/p>\n<p>AlmaLinux VDS ESXi ortam\u0131nda root parolas\u0131n\u0131 s\u0131f\u0131rlama i\u015flemi s\u0131ras\u0131nda, \u00e7e\u015fitli nedenlerle hatalarla kar\u015f\u0131la\u015fmak m\u00fcmk\u00fcnd\u00fcr. Bu hatalar genellikle yanl\u0131\u015f yap\u0131land\u0131rmalar, eksik ad\u0131mlar, donan\u0131m sorunlar\u0131 veya sistem hatalar\u0131ndan kaynaklan\u0131r. &#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221;nin bu b\u00f6l\u00fcm\u00fc, s\u0131k kar\u015f\u0131la\u015f\u0131lan hatalar\u0131 ve bu hatalar\u0131n \u00e7\u00f6z\u00fcmlerini ayr\u0131nt\u0131l\u0131 bir \u015fekilde ele alarak, sorunsuz bir parola s\u0131f\u0131rlama s\u00fcreci sa\u011flaman\u0131za yard\u0131mc\u0131 olmay\u0131 ama\u00e7lamaktad\u0131r. Bu b\u00f6l\u00fcm, hem yeni ba\u015flayanlar hem de deneyimli sistem y\u00f6neticileri i\u00e7in de\u011ferli bir kaynak olacakt\u0131r.<\/p>\n<p><strong>7.1 GRUB Men\u00fcs\u00fcne Giri\u015f Yap\u0131lamamas\u0131<\/strong><\/p>\n<p>GRUB (GRand Unified Bootloader) men\u00fcs\u00fc, sistemin ba\u015flat\u0131lmas\u0131 s\u0131ras\u0131nda i\u015fletim sistemi se\u00e7imini ve \u00e7ekirdek parametrelerini yap\u0131land\u0131rmay\u0131 sa\u011flayan kritik bir aray\u00fczd\u00fcr. GRUB men\u00fcs\u00fcne eri\u015filememesi, parola s\u0131f\u0131rlama i\u015fleminin ilk a\u015famas\u0131nda \u00f6nemli bir engel te\u015fkil edebilir.<\/p>\n<ul>\n<li><strong>Nedenleri:<\/strong>\n<ul>\n<li><strong>GRUB Men\u00fcs\u00fc Gizlenmi\u015f Olabilir:<\/strong> Baz\u0131 sistemlerde, GRUB men\u00fcs\u00fc varsay\u0131lan olarak gizlenmi\u015f olabilir ve sadece belirli bir s\u00fcre i\u00e7in g\u00f6r\u00fcnt\u00fclenir.<\/li>\n<li><strong>H\u0131zl\u0131 Ba\u015flatma (Fast Boot) Etkin Olabilir:<\/strong> H\u0131zl\u0131 ba\u015flatma \u00f6zelli\u011fi, sistemin daha h\u0131zl\u0131 a\u00e7\u0131lmas\u0131n\u0131 sa\u011flamak i\u00e7in GRUB men\u00fcs\u00fcn\u00fc atlayabilir.<\/li>\n<li><strong>BIOS Ayarlar\u0131 Yanl\u0131\u015f Yap\u0131land\u0131r\u0131lm\u0131\u015f Olabilir:<\/strong> BIOS ayarlar\u0131nda, ba\u015flatma s\u0131ras\u0131 veya klavye giri\u015f ayarlar\u0131 yanl\u0131\u015f yap\u0131land\u0131r\u0131lm\u0131\u015f olabilir.<\/li>\n<li><strong>ESXi Sanal Makine Ayarlar\u0131:<\/strong> ESXi&#8217;deki sanal makine ayarlar\u0131nda, BIOS&#8217;a giri\u015fi zorlama se\u00e7ene\u011fi etkin olmayabilir.<\/li>\n<li><strong>Klavye Giri\u015f Sorunlar\u0131:<\/strong> Sanal makine konsolunda klavye giri\u015fleri alg\u0131lanmayabilir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u00c7\u00f6z\u00fcmleri:<\/strong>\n<ul>\n<li><strong>GRUB Men\u00fcs\u00fcn\u00fc G\u00f6r\u00fcnt\u00fcleme S\u00fcresini Art\u0131rma:<\/strong>\n<ul>\n<li>Sistemi ba\u015flat\u0131n ve GRUB men\u00fcs\u00fcne eri\u015fmeyi deneyin (genellikle Esc, Shift veya F2 tu\u015flar\u0131na basarak).<\/li>\n<li>E\u011fer GRUB men\u00fcs\u00fcne eri\u015fmeyi ba\u015far\u0131rsan\u0131z, <code>\/etc\/default\/grub<\/code> dosyas\u0131n\u0131 bir metin d\u00fczenleyiciyle a\u00e7\u0131n (\u00f6rne\u011fin, <code>sudo nano \/etc\/default\/grub<\/code>).<\/li>\n<li><code>GRUB_TIMEOUT<\/code> de\u011fi\u015fkenini, GRUB men\u00fcs\u00fcn\u00fcn ka\u00e7 saniye boyunca g\u00f6r\u00fcnt\u00fclenece\u011fini belirleyen bir de\u011fere ayarlay\u0131n (\u00f6rne\u011fin, <code>GRUB_TIMEOUT=10<\/code>).<\/li>\n<li>De\u011fi\u015fiklikleri kaydedin ve dosyay\u0131 kapat\u0131n.<\/li>\n<li>GRUB yap\u0131land\u0131rmas\u0131n\u0131 g\u00fcncelleyin: <code>sudo grub2-mkconfig -o \/boot\/grub2\/grub.cfg<\/code>.<\/li>\n<li>Sistemi yeniden ba\u015flat\u0131n.<\/li>\n<\/ul>\n<\/li>\n<li><strong>H\u0131zl\u0131 Ba\u015flatmay\u0131 Devre D\u0131\u015f\u0131 B\u0131rakma:<\/strong>\n<ul>\n<li>BIOS ayarlar\u0131na girin (genellikle Del, F2 veya Esc tu\u015flar\u0131na basarak).<\/li>\n<li>&#8220;Boot&#8221; (Ba\u015flatma) veya &#8220;Advanced&#8221; (Geli\u015fmi\u015f) sekmesini bulun.<\/li>\n<li>&#8220;Fast Boot&#8221; (H\u0131zl\u0131 Ba\u015flatma) veya &#8220;Quick Boot&#8221; (\u00c7abuk Ba\u015flatma) se\u00e7ene\u011fini bulun ve devre d\u0131\u015f\u0131 b\u0131rak\u0131n.<\/li>\n<li>De\u011fi\u015fiklikleri kaydedin ve BIOS&#8217;tan \u00e7\u0131k\u0131n.<\/li>\n<\/ul>\n<\/li>\n<li><strong>BIOS Ba\u015flatma S\u0131ras\u0131n\u0131 Kontrol Etme:<\/strong>\n<ul>\n<li>BIOS ayarlar\u0131na girin.<\/li>\n<li>&#8220;Boot Order&#8221; (Ba\u015flatma S\u0131ras\u0131) veya benzer bir b\u00f6l\u00fcm\u00fc bulun.<\/li>\n<li>Sabit diskin veya sanal diskin ba\u015flatma s\u0131ras\u0131n\u0131n en \u00fcst\u00fcnde oldu\u011fundan emin olun.<\/li>\n<li>De\u011fi\u015fiklikleri kaydedin ve BIOS&#8217;tan \u00e7\u0131k\u0131n.<\/li>\n<\/ul>\n<\/li>\n<li><strong>ESXi BIOS&#8217;a Giri\u015fi Zorlama:<\/strong>\n<ul>\n<li>vSphere Client veya vSphere Web Client aray\u00fcz\u00fcne giri\u015f yap\u0131n.<\/li>\n<li>AlmaLinux VDS&#8217;nizi se\u00e7in.<\/li>\n<li>Sanal makine ayarlar\u0131n\u0131 d\u00fczenleyin (&#8220;Edit Settings&#8221;).<\/li>\n<li>&#8220;VM Options&#8221; (Sanal Makine Se\u00e7enekleri) sekmesini se\u00e7in.<\/li>\n<li>&#8220;Boot Options&#8221; (Ba\u015flatma Se\u00e7enekleri) b\u00f6l\u00fcm\u00fcn\u00fc bulun.<\/li>\n<li>&#8220;Force BIOS setup&#8221; (BIOS kurulumunu zorla) se\u00e7ene\u011fini i\u015faretleyin.<\/li>\n<li>De\u011fi\u015fiklikleri kaydedin ve sanal makineyi yeniden ba\u015flat\u0131n.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Sanal Makine Konsolunda Klavye Giri\u015fini Etkinle\u015ftirme:<\/strong>\n<ul>\n<li>ESXi ayarlar\u0131nda, sanal makine i\u00e7in &#8220;Boot Options&#8221; b\u00f6l\u00fcm\u00fcnde &#8220;Power-on Boot Behavior&#8221; ayar\u0131n\u0131 kontrol edin.<\/li>\n<li>&#8220;Enter BIOS setup&#8221; se\u00e7ene\u011fini etkinle\u015ftirerek, sanal makinenin her ba\u015flat\u0131l\u0131\u015f\u0131nda BIOS kurulum ekran\u0131na girmesini sa\u011flayabilirsiniz.<\/li>\n<li>Sanal makine konsolunda klavyenin do\u011fru \u015fekilde yap\u0131land\u0131r\u0131ld\u0131\u011f\u0131ndan emin olun.<\/li>\n<\/ul>\n<\/li>\n<li><strong>GRUB Men\u00fcs\u00fcne Eri\u015fmek \u0130\u00e7in Tu\u015flara Bas\u0131l\u0131 Tutma:<\/strong>\n<ul>\n<li>Sistemi yeniden ba\u015flat\u0131rken, GRUB men\u00fcs\u00fcne eri\u015fmek i\u00e7in Esc veya Shift tu\u015flar\u0131na bas\u0131l\u0131 tutun. Bu, GRUB men\u00fcs\u00fcn\u00fcn g\u00f6r\u00fcnt\u00fclenmesini sa\u011flayabilir.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>7.2 K\u00f6k Dosya Sisteminin Montajlanamamas\u0131<\/strong><\/p>\n<p>K\u00f6k dosya sisteminin (root filesystem) montajlanamamas\u0131, parola s\u0131f\u0131rlama i\u015fleminin ilerleyen a\u015famalar\u0131nda kar\u015f\u0131la\u015f\u0131labilecek ciddi bir sorundur. K\u00f6k dosya sistemi, sistemin temel dosyalar\u0131n\u0131 ve dizinlerini i\u00e7erir ve bu dosya sistemine eri\u015filememesi, parola s\u0131f\u0131rlama i\u015fleminin tamamlanmas\u0131n\u0131 engeller.<\/p>\n<ul>\n<li><strong>Nedenleri:<\/strong>\n<ul>\n<li><strong>Yanl\u0131\u015f B\u00f6l\u00fcm Ad\u0131:<\/strong> K\u00f6k dosya sistemini i\u00e7eren b\u00f6l\u00fcm\u00fcn ad\u0131 yanl\u0131\u015f belirtilmi\u015f olabilir.<\/li>\n<li><strong>Dosya Sistemi Hatas\u0131:<\/strong> K\u00f6k dosya sisteminde hatalar olabilir ve bu hatalar montaj i\u015flemini engelleyebilir.<\/li>\n<li><strong>LVM Etkinle\u015ftirilmemi\u015f Olabilir:<\/strong> E\u011fer sistem LVM (Logical Volume Manager) kullan\u0131yorsa, LVM etkinle\u015ftirilmemi\u015f olabilir.<\/li>\n<li><strong>Montaj Noktas\u0131 Mevcut De\u011fil:<\/strong> K\u00f6k dosya sisteminin montajlanaca\u011f\u0131 dizin (montaj noktas\u0131) mevcut olmayabilir.<\/li>\n<li><strong>Yetersiz \u0130zinler:<\/strong> Montaj noktas\u0131 dizininde yetersiz izinler olabilir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u00c7\u00f6z\u00fcmleri:<\/strong>\n<ul>\n<li><strong>Do\u011fru B\u00f6l\u00fcm Ad\u0131n\u0131 Belirleme:<\/strong>\n<ul>\n<li>Kurtarma modunda veya tek kullan\u0131c\u0131 modunda, <code>lsblk<\/code> komutunu kullanarak disk b\u00f6l\u00fcmlerini listeleyin ve k\u00f6k dosya sistemini i\u00e7eren b\u00f6l\u00fcm\u00fcn do\u011fru ad\u0131n\u0131 belirleyin.<\/li>\n<li>LVM kullan\u0131l\u0131yorsa, <code>\/dev\/mapper\/<\/code> dizininde k\u00f6k dosya sistemini i\u00e7eren mant\u0131ksal birimin ad\u0131n\u0131 bulun.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Dosya Sistemi Hatalar\u0131n\u0131 Onarma:<\/strong>\n<ul>\n<li><code>fsck<\/code> (file system check) komutunu kullanarak k\u00f6k dosya sistemindeki hatalar\u0131 onar\u0131n.<\/li>\n<li>\u00d6rne\u011fin: <code>fsck \/dev\/mapper\/almalinux-root<\/code> (k\u00f6k dosya sisteminin <code>\/dev\/mapper\/almalinux-root<\/code> oldu\u011fu varsay\u0131larak).<\/li>\n<li><code>fsck<\/code> komutu, dosya sistemindeki hatalar\u0131 otomatik olarak onarmaya \u00e7al\u0131\u015facakt\u0131r. \u0130\u015flem s\u0131ras\u0131nda onay istenirse, &#8220;y&#8221; (yes) yan\u0131t\u0131n\u0131 verin.<\/li>\n<\/ul>\n<\/li>\n<li><strong>LVM&#8217;yi Etkinle\u015ftirme:<\/strong>\n<ul>\n<li>E\u011fer sistem LVM kullan\u0131yorsa, a\u015fa\u011f\u0131daki komutlar\u0131 kullanarak LVM&#8217;yi etkinle\u015ftirin:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">vgscan\r\nvgchange -ay<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li><code>vgscan<\/code>: Sistemdeki t\u00fcm Volume Group&#8217;lar\u0131 (VG) tarar.<\/li>\n<li><code>vgchange -ay<\/code>: T\u00fcm Volume Group&#8217;lar\u0131 aktif hale getirir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Montaj Noktas\u0131n\u0131 Olu\u015fturma:<\/strong>\n<ul>\n<li>K\u00f6k dosya sistemini montajlamak i\u00e7in bir montaj noktas\u0131 olu\u015fturun:\n<pre><code class=\"lang-bash\"><span class=\"hljs-built_in\">mkdir<\/span> \/mnt\r\n<\/code><\/pre>\n<\/li>\n<li>E\u011fer montaj noktas\u0131 zaten mevcutsa, do\u011fru dizinin kullan\u0131ld\u0131\u011f\u0131ndan emin olun.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Yetersiz \u0130zinleri D\u00fczeltme:<\/strong>\n<ul>\n<li>Montaj noktas\u0131 dizininin do\u011fru izinlere sahip oldu\u011fundan emin olun:\n<pre><code class=\"lang-bash\">chmod <span class=\"hljs-number\">755<\/span> \/mnt\r\n<\/code><\/pre>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Montaj Komutunu Do\u011fru Kullanma:<\/strong>\n<ul>\n<li>K\u00f6k dosya sistemini montajlamak i\u00e7in do\u011fru komutu kulland\u0131\u011f\u0131n\u0131zdan emin olun:\n<pre><code class=\"lang-bash\">mount <span class=\"hljs-regexp\">\/dev\/m<\/span>apper<span class=\"hljs-regexp\">\/almalinux-root \/m<\/span>nt\r\n<\/code><\/pre>\n<\/li>\n<li>Gerekirse, <code>-t<\/code> se\u00e7ene\u011fini kullanarak dosya sistemi t\u00fcr\u00fcn\u00fc belirtin (\u00f6rne\u011fin, <code>mount -t xfs \/dev\/mapper\/almalinux-root \/mnt<\/code>).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>7.3 Parola De\u011fi\u015fikli\u011finin Uygulanmamas\u0131<\/strong><\/p>\n<p>Parola s\u0131f\u0131rlama i\u015flemi s\u0131ras\u0131nda, <code>passwd<\/code> komutu kullan\u0131larak yeni parola belirlenmesine ra\u011fmen, yeni parolan\u0131n uygulanmamas\u0131 ve sistemin eski parola ile \u00e7al\u0131\u015fmaya devam etmesi, kafa kar\u0131\u015ft\u0131r\u0131c\u0131 bir durum olabilir.<\/p>\n<ul>\n<li><strong>Nedenleri:<\/strong>\n<ul>\n<li><strong><code>chroot<\/code> Ortam\u0131nda Olmama:<\/strong> <code>passwd<\/code> komutunun sistemin ger\u00e7ek k\u00f6k dizininde \u00e7al\u0131\u015ft\u0131r\u0131lmamas\u0131.<\/li>\n<li><strong>Salt Okunur Dosya Sistemi:<\/strong> K\u00f6k dosya sisteminin salt okunur (read-only) modda monte edilmi\u015f olmas\u0131.<\/li>\n<li><strong>SELinux:<\/strong> SELinux g\u00fcvenlik politikalar\u0131n\u0131n parola de\u011fi\u015fikli\u011fini engellemesi.<\/li>\n<li><strong>Parola Politikalar\u0131:<\/strong> Sistemdeki parola politikalar\u0131n\u0131n yeni parolay\u0131 kabul etmemesi.<\/li>\n<li><strong>PAM (Pluggable Authentication Modules) Sorunlar\u0131:<\/strong> PAM yap\u0131land\u0131rmas\u0131nda sorunlar olmas\u0131.<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u00c7\u00f6z\u00fcmleri:<\/strong>\n<ul>\n<li><strong><code>chroot<\/code> Ortam\u0131nda \u00c7al\u0131\u015ft\u0131rma:<\/strong>\n<ul>\n<li><code>passwd<\/code> komutunu \u00e7al\u0131\u015ft\u0131rmadan \u00f6nce, <code>chroot \/mnt<\/code> komutu ile sistemin ger\u00e7ek k\u00f6k dizinine ge\u00e7ti\u011finizden emin olun (k\u00f6k dosya sisteminin <code>\/mnt<\/code> dizinine monte edildi\u011fi varsay\u0131larak).<\/li>\n<\/ul>\n<\/li>\n<li><strong>Dosya Sistemini Okuma\/Yazma Modunda Montajlama:<\/strong>\n<ul>\n<li>K\u00f6k dosya sisteminin okuma\/yazma modunda monte edildi\u011finden emin olun:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">mount<\/span> -o remount,rw \/mnt\r\n<\/code><\/pre>\n<\/li>\n<li>E\u011fer dosya sistemi zaten monte edilmi\u015fse, <code>mount<\/code> komutunun \u00e7\u0131kt\u0131s\u0131n\u0131 kontrol ederek montaj modunu do\u011frulay\u0131n.<\/li>\n<\/ul>\n<\/li>\n<li><strong>SELinux&#8217;u Ge\u00e7ici Olarak Devre D\u0131\u015f\u0131 B\u0131rakma:<\/strong>\n<ul>\n<li>Parola s\u0131f\u0131rlama i\u015flemi s\u0131ras\u0131nda SELinux&#8217;u ge\u00e7ici olarak devre d\u0131\u015f\u0131 b\u0131rak\u0131n:\n<pre><code class=\"lang-bash\">setenforce <span class=\"hljs-number\">0<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li>Parola s\u0131f\u0131rlama i\u015flemi tamamland\u0131ktan sonra, SELinux&#8217;u tekrar etkinle\u015ftirin:\n<pre><code class=\"lang-bash\">setenforce <span class=\"hljs-number\">1<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li>Alternatif olarak, SELinux&#8217;u devre d\u0131\u015f\u0131 b\u0131rakmak yerine, parola de\u011fi\u015fikli\u011fi i\u00e7in gerekli olan SELinux politikalar\u0131n\u0131 yap\u0131land\u0131rabilirsiniz.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Parola Politikalar\u0131n\u0131 Kontrol Etme:<\/strong>\n<ul>\n<li><code>\/etc\/login.defs<\/code> ve <code>\/etc\/pam.d\/system-auth<\/code> dosyalar\u0131n\u0131 kontrol ederek parola politikalar\u0131n\u0131 inceleyin.<\/li>\n<li>Parola uzunlu\u011fu, karma\u015f\u0131kl\u0131\u011f\u0131 veya tekrar kullan\u0131m\u0131 ile ilgili k\u0131s\u0131tlamalar olup olmad\u0131\u011f\u0131n\u0131 kontrol edin.<\/li>\n<li>Gerekirse, parola politikalar\u0131n\u0131 de\u011fi\u015ftirebilirsiniz, ancak bu de\u011fi\u015fikliklerin sistem g\u00fcvenli\u011fini etkileyebilece\u011fini unutmay\u0131n.<\/li>\n<\/ul>\n<\/li>\n<li><strong>PAM Yap\u0131land\u0131rmas\u0131n\u0131 Kontrol Etme:<\/strong>\n<ul>\n<li><code>\/etc\/pam.d\/system-auth<\/code> dosyas\u0131n\u0131 kontrol ederek PAM yap\u0131land\u0131rmas\u0131nda bir sorun olup olmad\u0131\u011f\u0131n\u0131 inceleyin.<\/li>\n<li>PAM mod\u00fcllerinin do\u011fru s\u0131rada ve do\u011fru se\u00e7eneklerle yap\u0131land\u0131r\u0131ld\u0131\u011f\u0131ndan emin olun.<\/li>\n<li>PAM yap\u0131land\u0131rmas\u0131 karma\u015f\u0131k olabilir ve yanl\u0131\u015f yap\u0131land\u0131rmalar sistemin \u00e7al\u0131\u015fmas\u0131n\u0131 etkileyebilir. Bu nedenle, PAM yap\u0131land\u0131rmas\u0131n\u0131 de\u011fi\u015ftirmeden \u00f6nce dikkatli olun ve yedekleme al\u0131n.<\/li>\n<\/ul>\n<\/li>\n<li><strong><code>sync<\/code> Komutunu Kullanma:<\/strong>\n<ul>\n<li>Parola de\u011fi\u015fikli\u011fi i\u015fleminden sonra, de\u011fi\u015fikliklerin diske yaz\u0131lmas\u0131n\u0131 sa\u011flamak i\u00e7in <code>sync<\/code> komutunu kullan\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-keyword\">sync<\/span>\r\n<\/code><\/pre>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>7.4 SSH Ba\u011flant\u0131 Sorunlar\u0131<\/strong><\/p>\n<p>Root parolas\u0131n\u0131 s\u0131f\u0131rlad\u0131ktan sonra, SSH (Secure Shell) ile sisteme ba\u011flan\u0131rken sorunlarla kar\u015f\u0131la\u015fmak m\u00fcmk\u00fcnd\u00fcr. Bu sorunlar genellikle yanl\u0131\u015f SSH yap\u0131land\u0131rmalar\u0131, g\u00fcvenlik duvar\u0131 ayarlar\u0131 veya kimlik do\u011frulama sorunlar\u0131ndan kaynaklan\u0131r.<\/p>\n<ul>\n<li><strong>Nedenleri:<\/strong>\n<ul>\n<li><strong>Yanl\u0131\u015f Parola:<\/strong> Yeni parolan\u0131n yanl\u0131\u015f girilmesi.<\/li>\n<li><strong>SSH Servisi \u00c7al\u0131\u015fm\u0131yor:<\/strong> SSH servisinin \u00e7al\u0131\u015fmamas\u0131.<\/li>\n<li><strong>G\u00fcvenlik Duvar\u0131:<\/strong> G\u00fcvenlik duvar\u0131n\u0131n SSH trafi\u011fini engellemesi.<\/li>\n<li><strong>SSH Portu De\u011fi\u015ftirilmi\u015f:<\/strong> SSH portunun de\u011fi\u015ftirilmi\u015f olmas\u0131 ve ba\u011flant\u0131 s\u0131ras\u0131nda do\u011fru portun kullan\u0131lmamas\u0131.<\/li>\n<li><strong>Anahtar Tabanl\u0131 Kimlik Do\u011frulama Sorunlar\u0131:<\/strong> Anahtar tabanl\u0131 kimlik do\u011frulama yap\u0131land\u0131r\u0131lm\u0131\u015fsa, anahtar dosyalar\u0131n\u0131n eksik veya yanl\u0131\u015f yap\u0131land\u0131r\u0131lm\u0131\u015f olmas\u0131.<\/li>\n<li><strong><code>PermitRootLogin<\/code> Ayar\u0131:<\/strong> <code>\/etc\/ssh\/sshd_config<\/code> dosyas\u0131nda <code>PermitRootLogin no<\/code> ayar\u0131n\u0131n etkin olmas\u0131 ve root kullan\u0131c\u0131s\u0131n\u0131n do\u011frudan SSH ile giri\u015f yapmas\u0131n\u0131n engellenmesi.<\/li>\n<li><strong><code>AllowUsers<\/code> veya <code>DenyUsers<\/code> Ayarlar\u0131:<\/strong> <code>\/etc\/ssh\/sshd_config<\/code> dosyas\u0131nda <code>AllowUsers<\/code> veya <code>DenyUsers<\/code> ayarlar\u0131n\u0131n yanl\u0131\u015f yap\u0131land\u0131r\u0131lm\u0131\u015f olmas\u0131 ve kullan\u0131c\u0131n\u0131n SSH ile giri\u015f yapmas\u0131n\u0131n engellenmesi.<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u00c7\u00f6z\u00fcmleri:<\/strong>\n<ul>\n<li><strong>Parolay\u0131 Do\u011fru Girme:<\/strong>\n<ul>\n<li>Parolay\u0131 do\u011fru girdi\u011finizden emin olun. Parolay\u0131 yazarken b\u00fcy\u00fck\/k\u00fc\u00e7\u00fck harf duyarl\u0131l\u0131\u011f\u0131na dikkat edin.<\/li>\n<\/ul>\n<\/li>\n<li><strong>SSH Servisini Kontrol Etme:<\/strong>\n<ul>\n<li>SSH servisinin \u00e7al\u0131\u015ft\u0131\u011f\u0131ndan emin olun:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">systemctl status sshd<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li>E\u011fer servis \u00e7al\u0131\u015fm\u0131yorsa, ba\u015flat\u0131n:\n<pre><code class=\"lang-bash\">systemctl <span class=\"hljs-literal\">start<\/span> sshd\r\n<\/code><\/pre>\n<\/li>\n<li>Servisin sistem ba\u015flang\u0131c\u0131nda otomatik olarak ba\u015flat\u0131ld\u0131\u011f\u0131ndan emin olun:\n<pre><code class=\"lang-bash\">systemctl <span class=\"hljs-built_in\">enable<\/span> sshd\r\n<\/code><\/pre>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>G\u00fcvenlik Duvar\u0131n\u0131 Yap\u0131land\u0131rma:<\/strong>\n<ul>\n<li>G\u00fcvenlik duvar\u0131n\u0131n SSH trafi\u011fine izin verdi\u011finden emin olun.<\/li>\n<li><code>firewalld<\/code> kullan\u0131yorsan\u0131z, SSH servisine izin vermek i\u00e7in a\u015fa\u011f\u0131daki komutlar\u0131 kullan\u0131n:\n<pre><code class=\"lang-bash\">firewall-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> --zone=public --add-service=ssh --permanent\r\n<\/span>firewall-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> --reload<\/span>\r\n<\/code><\/pre>\n<\/li>\n<li>E\u011fer SSH portu de\u011fi\u015ftirilmi\u015fse, do\u011fru porta izin verdi\u011finizden emin olun:\n<pre><code class=\"lang-bash\">firewall-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> --zone=public --add-port=&lt;yeni_port&gt;\/tcp --permanent\r\n<\/span>firewall-<span class=\"hljs-keyword\">cmd<\/span><span class=\"bash\"> --reload<\/span>\r\n<\/code><\/pre>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>SSH Portunu Do\u011fru Kullanma:<\/strong>\n<ul>\n<li>SSH ile ba\u011flan\u0131rken do\u011fru portu kulland\u0131\u011f\u0131n\u0131zdan emin olun:\n<pre><code class=\"lang-bash\">ssh -p <span class=\"hljs-variable\">&lt;yeni_port&gt;<\/span> kullanici<span class=\"hljs-meta\">@sunucu<\/span>\r\n<\/code><\/pre>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Anahtar Tabanl\u0131 Kimlik Do\u011frulamay\u0131 Kontrol Etme:<\/strong>\n<ul>\n<li>E\u011fer anahtar tabanl\u0131 kimlik do\u011frulama kullan\u0131yorsan\u0131z, \u00f6zel anahtar dosyas\u0131n\u0131n do\u011fru yerde ve do\u011fru izinlere sahip oldu\u011fundan emin olun.<\/li>\n<li>Genel anahtar\u0131n sunucudaki <code>~\/.ssh\/authorized_keys<\/code> dosyas\u0131na do\u011fru \u015fekilde kopyaland\u0131\u011f\u0131ndan emin olun.<\/li>\n<li><code>~\/.ssh\/authorized_keys<\/code> dosyas\u0131n\u0131n izinlerinin <code>600<\/code> oldu\u011fundan emin olun.<\/li>\n<\/ul>\n<\/li>\n<li><strong><code>PermitRootLogin<\/code> Ayar\u0131n\u0131 Kontrol Etme:<\/strong>\n<ul>\n<li><code>\/etc\/ssh\/sshd_config<\/code> dosyas\u0131nda <code>PermitRootLogin no<\/code> ayar\u0131 etkinse, root kullan\u0131c\u0131s\u0131n\u0131n do\u011frudan SSH ile giri\u015f yapmas\u0131n\u0131 engelleyecektir.<\/li>\n<li>Bu durumda, normal bir kullan\u0131c\u0131 hesab\u0131 ile giri\u015f yap\u0131n ve ard\u0131ndan <code>su<\/code> veya <code>sudo<\/code> komutlar\u0131n\u0131 kullanarak root yetkilerine y\u00fckselin.<\/li>\n<li>E\u011fer root kullan\u0131c\u0131s\u0131n\u0131n do\u011frudan SSH ile giri\u015f yapmas\u0131n\u0131 istiyorsan\u0131z, <code>PermitRootLogin yes<\/code> olarak ayarlayabilirsiniz, ancak bu g\u00fcvenlik a\u00e7\u0131s\u0131ndan tavsiye edilmez.<\/li>\n<\/ul>\n<\/li>\n<li><strong><code>AllowUsers<\/code> ve <code>DenyUsers<\/code> Ayarlar\u0131n\u0131 Kontrol Etme:<\/strong>\n<ul>\n<li><code>\/etc\/ssh\/sshd_config<\/code> dosyas\u0131nda <code>AllowUsers<\/code> ve <code>DenyUsers<\/code> ayarlar\u0131n\u0131n do\u011fru yap\u0131land\u0131r\u0131ld\u0131\u011f\u0131ndan emin olun.<\/li>\n<li>Kullan\u0131c\u0131n\u0131n <code>AllowUsers<\/code> listesinde oldu\u011fundan veya <code>DenyUsers<\/code> listesinde olmad\u0131\u011f\u0131ndan emin olun.<\/li>\n<\/ul>\n<\/li>\n<li><strong>SSH Servisini Yeniden Ba\u015flatma:<\/strong>\n<ul>\n<li>SSH yap\u0131land\u0131rmas\u0131nda herhangi bir de\u011fi\u015fiklik yapt\u0131ktan sonra, SSH servisini yeniden ba\u015flat\u0131n:\n<pre><code class=\"lang-bash\"><span class=\"hljs-attribute\">systemctl restart sshd<\/span>\r\n<\/code><\/pre>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>7.5 Di\u011fer Sorunlar ve Genel \u00c7\u00f6z\u00fcm \u00d6nerileri<\/strong><\/p>\n<ul>\n<li><strong>Sistem Donmas\u0131 veya Kilitlenmesi:<\/strong> Parola s\u0131f\u0131rlama i\u015flemi s\u0131ras\u0131nda sistem donarsa veya kilitlenirse, sanal makineyi ESXi aray\u00fcz\u00fcnden yeniden ba\u015flatmay\u0131 deneyin.<\/li>\n<li><strong>Veri Kayb\u0131:<\/strong> Parola s\u0131f\u0131rlama i\u015flemi s\u0131ras\u0131nda veri kayb\u0131 ya\u015famamak i\u00e7in, i\u015flemden \u00f6nce sisteminizin yede\u011fini al\u0131n.<\/li>\n<li><strong>Hata Mesajlar\u0131n\u0131 Dikkatlice Okuma:<\/strong> Kar\u015f\u0131la\u015ft\u0131\u011f\u0131n\u0131z hata mesajlar\u0131n\u0131 dikkatlice okuyun ve anlamaya \u00e7al\u0131\u015f\u0131n. Hata mesajlar\u0131, sorunun kayna\u011f\u0131 hakk\u0131nda ipu\u00e7lar\u0131 verebilir.<\/li>\n<li><strong>\u0130nternet Kaynaklar\u0131n\u0131 Kullanma:<\/strong> Kar\u015f\u0131la\u015ft\u0131\u011f\u0131n\u0131z sorunlarla ilgili olarak internette ara\u015ft\u0131rma yap\u0131n. \u00c7e\u015fitli forumlarda, bloglarda ve dok\u00fcmantasyonlarda benzer sorunlara \u00e7\u00f6z\u00fcm \u00f6nerileri bulabilirsiniz.<\/li>\n<li><strong>Uzman Yard\u0131m\u0131 Alma:<\/strong> E\u011fer sorunlar\u0131 \u00e7\u00f6zemiyorsan\u0131z, bir sistem y\u00f6neticisinden veya teknik destek uzman\u0131ndan yard\u0131m al\u0131n.<\/li>\n<\/ul>\n<p>Bu b\u00f6l\u00fcmde, AlmaLinux VDS ESXi ortam\u0131nda root parolas\u0131n\u0131 s\u0131f\u0131rlama i\u015flemi s\u0131ras\u0131nda s\u0131k kar\u015f\u0131la\u015f\u0131lan hatalar ve bu hatalar\u0131n \u00e7\u00f6z\u00fcmleri ayr\u0131nt\u0131l\u0131 bir \u015fekilde ele al\u0131nm\u0131\u015ft\u0131r. Bu bilgilerin, sorunsuz bir parola s\u0131f\u0131rlama s\u00fcreci sa\u011flaman\u0131za yard\u0131mc\u0131 olaca\u011f\u0131n\u0131 umuyoruz. &#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221;nin bu b\u00f6l\u00fcm\u00fc, size bu konuda kapsaml\u0131 bir rehberlik sa\u011flamay\u0131 ama\u00e7lamaktad\u0131r. Ba\u015far\u0131lar dilerim!<\/p>\n<h2 id=\"8-sonu-almalinux-vds-esxi-ortam-nda-g-venli-parola-y-netimi\"><span class=\"ez-toc-section\" id=\"8_Sonuc_AlmaLinux_VDS_ESXi_Ortaminda_Guvenli_Parola_Yonetimi\"><\/span>8. Sonu\u00e7: AlmaLinux VDS ESXi Ortam\u0131nda G\u00fcvenli Parola Y\u00f6netimi<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>AlmaLinux VDS ESXi ortam\u0131nda g\u00fcvenli parola y\u00f6netimi, sunucular\u0131n\u0131z\u0131n ve dolay\u0131s\u0131yla verilerinizin b\u00fct\u00fcnl\u00fc\u011f\u00fcn\u00fc korumak i\u00e7in hayati \u00f6neme sahiptir. Bu rehberin \u00f6nceki b\u00f6l\u00fcmlerinde, &#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221; ba\u015fl\u0131\u011f\u0131 alt\u0131nda, root parolas\u0131n\u0131n neden \u00f6nemli oldu\u011funu, ESXi \u00fczerinde \u00e7al\u0131\u015fan bir AlmaLinux VDS&#8217;de root parolas\u0131n\u0131 s\u0131f\u0131rlaman\u0131n \u00e7e\u015fitli y\u00f6ntemlerini ve bu s\u00fcre\u00e7te kar\u015f\u0131la\u015f\u0131labilecek sorunlar\u0131 ve \u00e7\u00f6z\u00fcmlerini detayl\u0131 bir \u015fekilde inceledik. Bu b\u00f6l\u00fcmde ise, parola s\u0131f\u0131rlama i\u015fleminin \u00f6tesine ge\u00e7erek, g\u00fcvenli bir parola y\u00f6netimi stratejisinin nas\u0131l olu\u015fturulaca\u011f\u0131n\u0131 ve uygulanaca\u011f\u0131n\u0131 ele alaca\u011f\u0131z. Amac\u0131m\u0131z, sadece parolay\u0131 s\u0131f\u0131rlamak de\u011fil, ayn\u0131 zamanda gelecekteki g\u00fcvenlik risklerini minimize etmektir.<\/p>\n<p><strong>8.1 Parola S\u0131f\u0131rlama \u0130\u015fleminin \u00d6nemi ve Dikkat Edilmesi Gerekenler<\/strong><\/p>\n<p>&#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221; boyunca vurgulad\u0131\u011f\u0131m\u0131z gibi, root parolas\u0131, sistemin en y\u00fcksek yetkilere sahip kullan\u0131c\u0131s\u0131na eri\u015fim sa\u011flad\u0131\u011f\u0131 i\u00e7in kritik bir \u00f6neme sahiptir. Parola s\u0131f\u0131rlama i\u015flemi, yetkisiz eri\u015fim, unutulan parolalar veya personel de\u011fi\u015fiklikleri gibi \u00e7e\u015fitli nedenlerle gerekli olabilir. Ancak, bu i\u015flem sadece bir \u00e7\u00f6z\u00fcm de\u011fil, ayn\u0131 zamanda bir f\u0131rsatt\u0131r. Parola s\u0131f\u0131rlama i\u015flemi s\u0131ras\u0131nda a\u015fa\u011f\u0131daki noktalara dikkat ederek, sistem g\u00fcvenli\u011finizi \u00f6nemli \u00f6l\u00e7\u00fcde art\u0131rabilirsiniz:<\/p>\n<ul>\n<li><strong>G\u00fcvenli Y\u00f6ntem Se\u00e7imi:<\/strong> Parola s\u0131f\u0131rlama i\u015flemi i\u00e7in en uygun y\u00f6ntemi se\u00e7erken, eri\u015fim seviyenizi, teknik bilginizi ve VDS sa\u011flay\u0131c\u0131n\u0131z\u0131n sundu\u011fu imkanlar\u0131 g\u00f6z \u00f6n\u00fcnde bulundurun. \u00d6rne\u011fin, ESXi konsoluna do\u011frudan eri\u015fiminiz varsa, bu y\u00f6ntem daha h\u0131zl\u0131 ve do\u011frudan bir \u00e7\u00f6z\u00fcm olabilir. Ancak, ESXi konsoluna eri\u015fiminiz yoksa, GRUB men\u00fcs\u00fcn\u00fc veya kurtarma modunu kullanman\u0131z gerekebilir.<\/li>\n<li><strong>Ad\u0131mlar\u0131 Dikkatlice Takip Etme:<\/strong> Parola s\u0131f\u0131rlama i\u015fleminin her ad\u0131m\u0131n\u0131 dikkatlice takip edin ve talimatlar\u0131 do\u011fru bir \u015fekilde uygulay\u0131n. Yanl\u0131\u015f bir ad\u0131m, sistemin \u00e7al\u0131\u015fmamas\u0131na veya veri kayb\u0131na neden olabilir.<\/li>\n<li><strong>G\u00fc\u00e7l\u00fc Parola Olu\u015fturma:<\/strong> Parola s\u0131f\u0131rlama i\u015flemi s\u0131ras\u0131nda, g\u00fc\u00e7l\u00fc ve benzersiz bir parola olu\u015fturdu\u011funuzdan emin olun. Parola uzunlu\u011fu, karma\u015f\u0131kl\u0131\u011f\u0131 ve tahmin edilebilirlikten ka\u00e7\u0131nma gibi fakt\u00f6rlere dikkat edin.<\/li>\n<li><strong>\u0130ki Fakt\u00f6rl\u00fc Kimlik Do\u011frulama (2FA) Etkinle\u015ftirme:<\/strong> Parola s\u0131f\u0131rlama i\u015flemi tamamland\u0131ktan sonra, m\u00fcmk\u00fcnse iki fakt\u00f6rl\u00fc kimlik do\u011frulamay\u0131 (2FA) etkinle\u015ftirin. 2FA, sisteminizi parola tabanl\u0131 sald\u0131r\u0131lara kar\u015f\u0131 ek bir koruma katman\u0131 sa\u011flar.<\/li>\n<li><strong>Sistem G\u00fcncellemelerini Yapma:<\/strong> Parola s\u0131f\u0131rlama i\u015flemi sonras\u0131nda, sistem g\u00fcncellemelerini yaparak bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kapat\u0131n.<\/li>\n<li><strong>Loglar\u0131 \u0130zleme:<\/strong> Parola s\u0131f\u0131rlama i\u015flemi ve sonras\u0131nda sistem loglar\u0131n\u0131 izleyerek, yetkisiz eri\u015fim giri\u015fimlerini veya di\u011fer \u015f\u00fcpheli\u6d3b\u52a8leri tespit etmeye \u00e7al\u0131\u015f\u0131n.<\/li>\n<li><strong>Yedekleme:<\/strong> Parola s\u0131f\u0131rlama i\u015flemine ba\u015flamadan \u00f6nce, sisteminizin yede\u011fini alman\u0131z \u00f6nerilir. Bu, i\u015flem s\u0131ras\u0131nda bir sorun olu\u015fmas\u0131 durumunda verilerinizi kurtarman\u0131za olanak tan\u0131r.<\/li>\n<\/ul>\n<p><strong>8.2 G\u00fcvenli VDS Y\u00f6netimi i\u00e7in \u00d6neriler<\/strong><\/p>\n<p>&#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221;nde ele ald\u0131\u011f\u0131m\u0131z konular\u0131n \u00f6tesinde, g\u00fcvenli bir VDS y\u00f6netimi i\u00e7in a\u015fa\u011f\u0131daki \u00f6nerileri dikkate alman\u0131z \u00f6nemlidir:<\/p>\n<ul>\n<li><strong>En Az Yetki \u0130lkesi:<\/strong> Kullan\u0131c\u0131lara sadece ihtiya\u00e7 duyduklar\u0131 yetkileri verin. Gereksiz yetkilere sahip kullan\u0131c\u0131 hesaplar\u0131, sisteminizi daha savunmas\u0131z hale getirebilir.<\/li>\n<li><strong>Hesap Y\u00f6netimi:<\/strong> Kullan\u0131c\u0131 hesaplar\u0131n\u0131 d\u00fczenli olarak inceleyin ve gerekmeyen hesaplar\u0131 devre d\u0131\u015f\u0131 b\u0131rak\u0131n veya silin. Personel de\u011fi\u015fiklikleri oldu\u011funda, eski \u00e7al\u0131\u015fanlar\u0131n hesaplar\u0131n\u0131 derhal devre d\u0131\u015f\u0131 b\u0131rak\u0131n.<\/li>\n<li><strong>D\u00fczenli Denetimler:<\/strong> Sistem ve g\u00fcvenlik ayarlar\u0131n\u0131 d\u00fczenli olarak denetleyin. Yanl\u0131\u015f yap\u0131land\u0131rmalar\u0131 veya g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 tespit etmek i\u00e7in otomatik denetim ara\u00e7lar\u0131 kullanabilirsiniz.<\/li>\n<li><strong>G\u00fcvenlik Yaz\u0131l\u0131mlar\u0131:<\/strong> K\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlara kar\u015f\u0131 korunmak i\u00e7in antivir\u00fcs yaz\u0131l\u0131mlar\u0131 ve g\u00fcvenlik duvarlar\u0131 kullan\u0131n. Bu yaz\u0131l\u0131mlar\u0131n g\u00fcncel oldu\u011fundan emin olun.<\/li>\n<li><strong>Sald\u0131r\u0131 Tespit Sistemleri (IDS) ve Sald\u0131r\u0131 \u00d6nleme Sistemleri (IPS):<\/strong> IDS ve IPS sistemleri, a\u011f trafi\u011fini analiz ederek \u015f\u00fcpheli\u6d3b\u52a8leri tespit eder ve engeller.<\/li>\n<li><strong>Veri \u015eifreleme:<\/strong> Hassas verileri \u015fifreleyerek, yetkisiz eri\u015fim durumunda bile verilerin korunmas\u0131n\u0131 sa\u011flay\u0131n. Veri tabanlar\u0131n\u0131, diskleri ve yedekleme dosyalar\u0131n\u0131 \u015fifreleyebilirsiniz.<\/li>\n<li><strong>G\u00fcvenlik E\u011fitimleri:<\/strong> Kullan\u0131c\u0131lar\u0131 g\u00fcvenlik konusunda e\u011fitin. Kullan\u0131c\u0131lar, kimlik av\u0131 sald\u0131r\u0131lar\u0131n\u0131 tan\u0131may\u0131, g\u00fcvenli parolalar olu\u015fturmay\u0131 ve g\u00fcvenli internet kullan\u0131m\u0131 konusunda bilin\u00e7li olmal\u0131d\u0131r.<\/li>\n<li><strong>G\u00fcncel Kalma:<\/strong> G\u00fcvenlik alan\u0131ndaki en son geli\u015fmeleri takip edin. Yeni g\u00fcvenlik a\u00e7\u0131klar\u0131 ve tehditler hakk\u0131nda bilgi sahibi olmak, sisteminizi daha iyi koruman\u0131za yard\u0131mc\u0131 olacakt\u0131r.<\/li>\n<li><strong>Olay M\u00fcdahale Plan\u0131:<\/strong> Bir g\u00fcvenlik ihlali durumunda ne yapaca\u011f\u0131n\u0131z\u0131 belirleyen bir olay m\u00fcdahale plan\u0131 olu\u015fturun. Bu plan, ihlali h\u0131zl\u0131 bir \u015fekilde tespit etmenize, kontrol alt\u0131na alman\u0131za ve etkilerini azaltman\u0131za yard\u0131mc\u0131 olacakt\u0131r.<\/li>\n<li><strong>VDS Sa\u011flay\u0131c\u0131s\u0131n\u0131n G\u00fcvenli\u011fi:<\/strong> VDS sa\u011flay\u0131c\u0131n\u0131z\u0131n g\u00fcvenlik uygulamalar\u0131n\u0131 ve sertifikalar\u0131n\u0131 kontrol edin. Sa\u011flay\u0131c\u0131n\u0131z\u0131n g\u00fcvenli bir altyap\u0131 sundu\u011fundan emin olun.<\/li>\n<\/ul>\n<p><strong>8.3 Di\u011fer G\u00fcvenlik \u00d6nlemleri ve Kaynaklar<\/strong><\/p>\n<p>&#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221;nde ele ald\u0131\u011f\u0131m\u0131z konulara ek olarak, sistem g\u00fcvenli\u011finizi daha da art\u0131rmak i\u00e7in a\u015fa\u011f\u0131daki \u00f6nlemleri alabilirsiniz:<\/p>\n<ul>\n<li><strong>A\u011f Segmentasyonu:<\/strong> A\u011f\u0131n\u0131z\u0131 farkl\u0131 segmentlere ay\u0131rarak, bir segmentteki bir g\u00fcvenlik ihlalinin di\u011fer segmentlere yay\u0131lmas\u0131n\u0131 engelleyebilirsiniz.<\/li>\n<li><strong>Mikro Segmentasyon:<\/strong> Uygulama d\u00fczeyinde g\u00fcvenlik politikalar\u0131 uygulayarak, a\u011f trafi\u011fini daha detayl\u0131 bir \u015fekilde kontrol edebilirsiniz.<\/li>\n<li><strong>Web Uygulama G\u00fcvenlik Duvar\u0131 (WAF):<\/strong> Web uygulamalar\u0131n\u0131z\u0131 SQL injection, cross-site scripting (XSS) ve di\u011fer web tabanl\u0131 sald\u0131r\u0131lara kar\u015f\u0131 korumak i\u00e7in bir WAF kullan\u0131n.<\/li>\n<li><strong>Veri Kayb\u0131 \u00d6nleme (DLP):<\/strong> Hassas verilerin sistem d\u0131\u015f\u0131na \u00e7\u0131kmas\u0131n\u0131 engellemek i\u00e7in DLP \u00e7\u00f6z\u00fcmleri kullan\u0131n.<\/li>\n<li><strong>Tehdit \u0130stihbarat\u0131:<\/strong> Tehdit istihbarat\u0131 kaynaklar\u0131ndan bilgi edinerek, olas\u0131 sald\u0131r\u0131lar\u0131 \u00f6nceden tahmin edebilir ve \u00f6nlem alabilirsiniz.<\/li>\n<li><strong>Zafiyet Tarama:<\/strong> D\u00fczenli olarak zafiyet taramalar\u0131 yaparak, sisteminizdeki g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 tespit edin ve giderin.<\/li>\n<li><strong>S\u0131zma Testi:<\/strong> D\u0131\u015far\u0131dan bir g\u00fcvenlik uzman\u0131n\u0131n sisteminize s\u0131zmay\u0131 denedi\u011fi s\u0131zma testleri yaparak, sisteminizin g\u00fcvenlik seviyesini de\u011ferlendirin.<\/li>\n<\/ul>\n<p><strong>Faydal\u0131 Kaynaklar:<\/strong><\/p>\n<ul>\n<li><strong>Center for Internet Security (CIS):<\/strong> CIS, sistemlerin g\u00fcvenli\u011fini art\u0131rmak i\u00e7in yap\u0131land\u0131rma k\u0131lavuzlar\u0131 ve ara\u00e7lar sunar.<\/li>\n<li><strong>National Institute of Standards and Technology (NIST):<\/strong> NIST, g\u00fcvenlik standartlar\u0131 ve k\u0131lavuzlar yay\u0131nlar.<\/li>\n<li><strong>Open Web Application Security Project (OWASP):<\/strong> OWASP, web uygulamalar\u0131n\u0131n g\u00fcvenli\u011fini art\u0131rmak i\u00e7in ara\u00e7lar, dok\u00fcmantasyon ve topluluk deste\u011fi sunar.<\/li>\n<li><strong>SANS Institute:<\/strong> SANS Institute, g\u00fcvenlik e\u011fitimleri ve sertifikasyonlar\u0131 sunar.<\/li>\n<\/ul>\n<p><strong>\u00d6rnek Senaryolar:<\/strong><\/p>\n<ul>\n<li><strong>Senaryo 1: K\u00fc\u00e7\u00fck Bir \u0130\u015fletme<\/strong>\n<p>K\u00fc\u00e7\u00fck bir i\u015fletme, AlmaLinux VDS \u00fczerinde \u00e7al\u0131\u015fan bir web sitesi ve e-posta sunucusuna sahiptir. \u0130\u015fletme, a\u015fa\u011f\u0131daki g\u00fcvenlik \u00f6nlemlerini al\u0131r:<\/p>\n<ul>\n<li>G\u00fc\u00e7l\u00fc ve benzersiz parolalar kullan\u0131r.<\/li>\n<li>\u0130ki fakt\u00f6rl\u00fc kimlik do\u011frulamay\u0131 etkinle\u015ftirir.<\/li>\n<li>SSH eri\u015fimini g\u00fcvenli hale getirir (port de\u011fi\u015fikli\u011fi, anahtar tabanl\u0131 kimlik do\u011frulama).<\/li>\n<li>G\u00fcvenlik duvar\u0131n\u0131 yap\u0131land\u0131r\u0131r.<\/li>\n<li>Sistem loglar\u0131n\u0131 d\u00fczenli olarak izler.<\/li>\n<li>Sistem g\u00fcncellemelerini d\u00fczenli olarak yapar.<\/li>\n<li>Web sitesini ve e-posta sunucusunu d\u00fczenli olarak yedekler.<\/li>\n<li>\u00c7al\u0131\u015fanlar\u0131na g\u00fcvenlik e\u011fitimi verir.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Senaryo 2: B\u00fcy\u00fck Bir \u015eirket<\/strong>\n<p>B\u00fcy\u00fck bir \u015firket, ESXi \u00fczerinde sanalla\u015ft\u0131r\u0131lm\u0131\u015f bir AlmaLinux VDS altyap\u0131s\u0131na sahiptir. \u015eirket, a\u015fa\u011f\u0131daki g\u00fcvenlik \u00f6nlemlerini al\u0131r:<\/p>\n<ul>\n<li>Merkezi bir parola y\u00f6netimi sistemi kullan\u0131r.<\/li>\n<li>Kimlik ve eri\u015fim y\u00f6netimi (IAM) \u00e7\u00f6z\u00fcmleri kullan\u0131r.<\/li>\n<li>A\u011f segmentasyonu ve mikro segmentasyon uygular.<\/li>\n<li>Web uygulama g\u00fcvenlik duvar\u0131 (WAF) kullan\u0131r.<\/li>\n<li>Veri kayb\u0131 \u00f6nleme (DLP) \u00e7\u00f6z\u00fcmleri kullan\u0131r.<\/li>\n<li>Tehdit istihbarat\u0131 kaynaklar\u0131ndan bilgi edinir.<\/li>\n<li>D\u00fczenli olarak zafiyet taramalar\u0131 ve s\u0131zma testleri yapar.<\/li>\n<li>G\u00fcvenlik olaylar\u0131n\u0131 tespit etmek ve m\u00fcdahale etmek i\u00e7in bir g\u00fcvenlik operasyon merkezi (SOC) kurar.<\/li>\n<li>\u00c7al\u0131\u015fanlar\u0131na d\u00fczenli olarak g\u00fcvenlik e\u011fitimi verir.<\/li>\n<li>ISO 27001 gibi g\u00fcvenlik standartlar\u0131na uygunluk sa\u011flar.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>\u00d6zet Tablosu: G\u00fcvenli Parola Y\u00f6netimi ve VDS G\u00fcvenli\u011fi \u0130\u00e7in Kontrol Listesi<\/strong><\/p>\n<table>\n<thead>\n<tr>\n<th>\u00d6nlem<\/th>\n<th>A\u00e7\u0131klama<\/th>\n<th>S\u0131kl\u0131k<\/th>\n<th>Sorumlu<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>G\u00fc\u00e7l\u00fc ve Benzersiz Parolalar<\/td>\n<td>En az 12 karakter uzunlu\u011funda, b\u00fcy\u00fck harfler, k\u00fc\u00e7\u00fck harfler, rakamlar ve semboller i\u00e7eren, tahmin edilemeyen parolalar kullan\u0131n.<\/td>\n<td>Her Hesap Olu\u015fturmada\/De\u011fi\u015fiklikte<\/td>\n<td>Kullan\u0131c\u0131<\/td>\n<\/tr>\n<tr>\n<td>D\u00fczenli Parola De\u011fi\u015fiklikleri<\/td>\n<td>K\u00f6k parolas\u0131 gibi hassas parolalar\u0131 her 30-90 g\u00fcnde bir de\u011fi\u015ftirin.<\/td>\n<td>30-90 G\u00fcnl\u00fck<\/td>\n<td>Sistem Y\u00f6neticisi<\/td>\n<\/tr>\n<tr>\n<td>\u0130ki Fakt\u00f6rl\u00fc Kimlik Do\u011frulama (2FA)<\/td>\n<td>M\u00fcmk\u00fcn olan her yerde 2FA&#8217;y\u0131 etkinle\u015ftirin.<\/td>\n<td>Bir Kere<\/td>\n<td>Sistem Y\u00f6neticisi\/Kullan\u0131c\u0131<\/td>\n<\/tr>\n<tr>\n<td>SSH Eri\u015fimi G\u00fcvenli\u011fini Sa\u011flama<\/td>\n<td>SSH portunu de\u011fi\u015ftirin, anahtar tabanl\u0131 kimlik do\u011frulamay\u0131 etkinle\u015ftirin, <code>PermitRootLogin<\/code> ayar\u0131n\u0131 kontrol edin, <code>AllowUsers<\/code> ve <code>DenyUsers<\/code> ayarlar\u0131n\u0131 yap\u0131land\u0131r\u0131n.<\/td>\n<td>Bir Kere<\/td>\n<td>Sistem Y\u00f6neticisi<\/td>\n<\/tr>\n<tr>\n<td>Yetkisiz Eri\u015fimleri Engelleme (G\u00fcvenlik Duvar\u0131)<\/td>\n<td>G\u00fcvenlik duvar\u0131n\u0131 yap\u0131land\u0131rarak sadece gerekli olan servislere izin verin.<\/td>\n<td>Bir Kere<\/td>\n<td>Sistem Y\u00f6neticisi<\/td>\n<\/tr>\n<tr>\n<td>Sistem Loglar\u0131n\u0131 D\u00fczenli Olarak \u0130zleme<\/td>\n<td>Sistem loglar\u0131n\u0131 d\u00fczenli olarak inceleyin ve \u015f\u00fcpheli aktivite tespit etmeye \u00e7al\u0131\u015f\u0131n.<\/td>\n<td>G\u00fcnl\u00fck\/Haftal\u0131k<\/td>\n<td>Sistem Y\u00f6neticisi<\/td>\n<\/tr>\n<tr>\n<td>Sistem G\u00fcncellemelerini D\u00fczenli Olarak Yapma<\/td>\n<td>Sistem g\u00fcncellemelerini d\u00fczenli olarak yaparak bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 kapat\u0131n.<\/td>\n<td>G\u00fcnl\u00fck\/Haftal\u0131k<\/td>\n<td>Sistem Y\u00f6neticisi<\/td>\n<\/tr>\n<tr>\n<td>Gereksiz Servisleri Devre D\u0131\u015f\u0131 B\u0131rakma<\/td>\n<td>Gereksiz servisleri devre d\u0131\u015f\u0131 b\u0131rakarak sisteminizin sald\u0131r\u0131 y\u00fczeyini azalt\u0131n.<\/td>\n<td>Bir Kere<\/td>\n<td>Sistem Y\u00f6neticisi<\/td>\n<\/tr>\n<tr>\n<td>Dosya Sistemi \u0130zinlerini Kontrol Etme<\/td>\n<td>Dosya sistemi izinlerini kontrol ederek yetkisiz eri\u015fimi engelleyin.<\/td>\n<td>D\u00fczenli Olarak<\/td>\n<td>Sistem Y\u00f6neticisi<\/td>\n<\/tr>\n<tr>\n<td>SELinux&#8217;u Etkinle\u015ftirme ve Yap\u0131land\u0131rma<\/td>\n<td>SELinux&#8217;u etkinle\u015ftirerek ve do\u011fru \u015fekilde yap\u0131land\u0131rarak sisteminizin g\u00fcvenli\u011fini art\u0131r\u0131n.<\/td>\n<td>Bir Kere<\/td>\n<td>Sistem Y\u00f6neticisi<\/td>\n<\/tr>\n<tr>\n<td>Yedekleme ve Kurtarma Plan\u0131 Olu\u015fturma<\/td>\n<td>Verilerinizi d\u00fczenli olarak yedekleyin ve bir kurtarma plan\u0131 olu\u015fturun.<\/td>\n<td>D\u00fczenli Olarak<\/td>\n<td>Sistem Y\u00f6neticisi<\/td>\n<\/tr>\n<tr>\n<td>Fiziksel G\u00fcvenli\u011fi Sa\u011flama<\/td>\n<td>Sunucu odas\u0131n\u0131n ve donan\u0131mlar\u0131n fiziksel g\u00fcvenli\u011fini sa\u011flay\u0131n.<\/td>\n<td>Bir Kere<\/td>\n<td>Sistem Y\u00f6neticisi<\/td>\n<\/tr>\n<tr>\n<td>Bilin\u00e7lendirme E\u011fitimleri D\u00fczenleme<\/td>\n<td>Kullan\u0131c\u0131lar\u0131 g\u00fcvenlik konusunda bilin\u00e7lendirin.<\/td>\n<td>D\u00fczenli Olarak<\/td>\n<td>Sistem Y\u00f6neticisi\/\u0130nsan Kaynaklar\u0131<\/td>\n<\/tr>\n<tr>\n<td>En \u0130yi Uygulamalar\u0131 Takip Etme<\/td>\n<td>G\u00fcvenlik alan\u0131ndaki en iyi uygulamalar\u0131 takip edin ve sisteminizi s\u00fcrekli olarak g\u00fcncel tutun.<\/td>\n<td>S\u00fcrekli<\/td>\n<td>Sistem Y\u00f6neticisi<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>8.4 Sonu\u00e7: G\u00fcvenli Bir Gelecek \u0130\u00e7in S\u00fcrekli Dikkat<\/strong><\/p>\n<p>&#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221; boyunca, root parolas\u0131n\u0131n \u00f6nemini, s\u0131f\u0131rlama y\u00f6ntemlerini, sorun giderme ipu\u00e7lar\u0131n\u0131 ve g\u00fcvenli VDS y\u00f6netimi i\u00e7in \u00f6nerileri detayl\u0131 bir \u015fekilde ele ald\u0131k. Ancak, g\u00fcvenlik s\u00fcrekli bir s\u00fcre\u00e7tir ve tek bir i\u015flem veya \u00f6nlem, sisteminizi tamamen g\u00fcvenli hale getiremez. G\u00fcvenli bir gelecek i\u00e7in, s\u00fcrekli dikkatli olman\u0131z, sisteminizi d\u00fczenli olarak izlemeniz, g\u00fcncellemeniz ve yap\u0131land\u0131rman\u0131z gerekmektedir.<\/p>\n<p>Unutmay\u0131n, &#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221; sadece bir ba\u015flang\u0131\u00e7 noktas\u0131d\u0131r. G\u00fcvenlik alan\u0131ndaki en son geli\u015fmeleri takip etmeye devam edin, yeni tehditlere kar\u015f\u0131 haz\u0131rl\u0131kl\u0131 olun ve sisteminizi s\u00fcrekli olarak iyile\u015ftirin. G\u00fcvenli bir sistem, sadece verilerinizi korumakla kalmaz, ayn\u0131 zamanda i\u015fletmenizin itibar\u0131n\u0131 ve ba\u015far\u0131s\u0131n\u0131 da destekler.<\/p>\n<p>G\u00fcvenli\u011finiz i\u00e7in bol \u015fans!<\/p>\n<p><a href=\"https:\/\/www.vipservis.com\"><strong>Vipservis.com<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi: Ad\u0131m Ad\u0131m! 1. Giri\u015f: AlmaLinux VDS ve ESXi Ortam\u0131nda Root Parolas\u0131n\u0131n \u00d6nemi AlmaLinux VDS (Sanal \u00d6zel Sunucu) ve ESXi ortam\u0131nda root parolas\u0131n\u0131n \u00f6nemi, sunucu g\u00fcvenli\u011finin ve y\u00f6netilebilirli\u011finin temel ta\u015flar\u0131ndan biridir. Bu rehber, &#8220;AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi&#8221; ba\u015fl\u0131\u011f\u0131 alt\u0131nda, bu iki teknolojinin birle\u015fiminde root parolas\u0131n\u0131n neden [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11653,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[123],"tags":[17842,17845,17608,17843,17844,15921,17847,17852,17859,17857,17862,17846,17851,17856,17864,17860,17858,17841,17850,17853,17865,17861,17863,17854,17848,17849,17855,8258,8781,17866,9252,7822],"class_list":["post-11652","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-web-hosting","tag-esxi","tag-parola-yonetimi","tag-rehber","tag-root-parolasi","tag-sifirlama","tag-almalinux","tag-almalinux-esxi-root-sifre-sifirlama","tag-almalinux-esxi-sifre-reset","tag-almalinux-grub-root-parolasi","tag-almalinux-grub-root-reset","tag-almalinux-parolayi-unuttum","tag-almalinux-root-parolasi-sifirlama","tag-almalinux-root-password-reset","tag-almalinux-root-sifre-unutulursa","tag-almalinux-sifre-kurtarma-esxi","tag-almalinux-sifre-sifirlama-rehberi","tag-almalinux-tek-kullanici-modu-root-reset","tag-almalinux-vds-esxi-root-parolasini-sifirlama-rehberi","tag-almalinux-vds-root-reset","tag-almalinux-vds-root-sifresi-nasil-degistirilir","tag-almalinux-vds-sifre-kurtarma","tag-almalinux-vps-esxi-root-reset","tag-almalinux-vps-root-password-unuttum","tag-almalinux-vps-root-sifresi","tag-almalinux-vps-sifre-unutuldu","tag-esxi-almalinux-root-reset","tag-esxi-root-password-almalinux","tag-guvenlik","tag-linux","tag-linux-root-sifresi-sifirlama","tag-sanallastirma","tag-vds"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi: Ad\u0131m Ad\u0131m! - Vipservis Blog<\/title>\n<meta name=\"description\" content=\"AlmaLinux VDS ESXi root parolas\u0131n\u0131 s\u0131f\u0131rlama rehberi mi ar\u0131yorsunuz? Ad\u0131m ad\u0131m anlat\u0131m\u0131m\u0131zla g\u00fcvenli\u011fi sa\u011flay\u0131n! Unutulan parolalar\u0131 kolayca s\u0131f\u0131rlay\u0131n.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi: Ad\u0131m Ad\u0131m! - Vipservis Blog\" \/>\n<meta property=\"og:description\" content=\"AlmaLinux VDS ESXi root parolas\u0131n\u0131 s\u0131f\u0131rlama rehberi mi ar\u0131yorsunuz? Ad\u0131m ad\u0131m anlat\u0131m\u0131m\u0131zla g\u00fcvenli\u011fi sa\u011flay\u0131n! Unutulan parolalar\u0131 kolayca s\u0131f\u0131rlay\u0131n.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/\" \/>\n<meta property=\"og:site_name\" content=\"Vipservis Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/vipserviscom\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-23T00:18:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.vipservis.com\/blog\/wp-content\/uploads\/2025\/08\/almalinuxesxi-sifre-sifirlama.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Vipservis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@vipserviscom\" \/>\n<meta name=\"twitter:site\" content=\"@vipserviscom\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vipservis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"77 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/\"},\"author\":{\"name\":\"Vipservis\",\"@id\":\"https:\/\/www.vipservis.com\/blog\/#\/schema\/person\/cdb61a7e4f2eef5e8f9550829d769ed2\"},\"headline\":\"AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi: Ad\u0131m Ad\u0131m!\",\"datePublished\":\"2025-08-23T00:18:36+00:00\",\"dateModified\":\"2025-08-23T00:18:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/\"},\"wordCount\":20725,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.vipservis.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.vipservis.com\/blog\/wp-content\/uploads\/2025\/08\/almalinuxesxi-sifre-sifirlama.png\",\"keywords\":[\"\\\"ESXi\\\"\",\"\\\"parola y\u00f6netimi\",\"\\\"rehber\\\"\",\"\\\"root parolas\u0131\\\"\",\"\\\"s\u0131f\u0131rlama\\\"\",\"AlmaLinux\",\"AlmaLinux ESXi root \u015fifre s\u0131f\u0131rlama\",\"AlmaLinux ESXi \u015fifre reset\",\"AlmaLinux GRUB root parolas\u0131\",\"AlmaLinux grub root reset\",\"AlmaLinux parolay\u0131 unuttum\",\"AlmaLinux root parolas\u0131 s\u0131f\u0131rlama\",\"AlmaLinux root password reset\",\"AlmaLinux root \u015fifre unutulursa\",\"AlmaLinux \u015fifre kurtarma ESXi\",\"AlmaLinux \u015fifre s\u0131f\u0131rlama rehberi\",\"AlmaLinux tek kullan\u0131c\u0131 modu root reset\",\"AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi\",\"AlmaLinux VDS root reset\",\"AlmaLinux VDS root \u015fifresi nas\u0131l de\u011fi\u015ftirilir\",\"AlmaLinux VDS \u015fifre kurtarma\",\"AlmaLinux VPS ESXi root reset\",\"AlmaLinux VPS root password unuttum\",\"AlmaLinux VPS root \u015fifresi\",\"AlmaLinux VPS \u015fifre unutuldu\",\"ESXi AlmaLinux root reset\",\"ESXi root password AlmaLinux\",\"g\u00fcvenlik\",\"linux\",\"linux root \u015fifresi s\u0131f\u0131rlama\",\"sanalla\u015ft\u0131rma\",\"VDS\"],\"articleSection\":[\"Web Hosting\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/\",\"url\":\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/\",\"name\":\"AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi: Ad\u0131m Ad\u0131m! - Vipservis Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.vipservis.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.vipservis.com\/blog\/wp-content\/uploads\/2025\/08\/almalinuxesxi-sifre-sifirlama.png\",\"datePublished\":\"2025-08-23T00:18:36+00:00\",\"dateModified\":\"2025-08-23T00:18:36+00:00\",\"description\":\"AlmaLinux VDS ESXi root parolas\u0131n\u0131 s\u0131f\u0131rlama rehberi mi ar\u0131yorsunuz? Ad\u0131m ad\u0131m anlat\u0131m\u0131m\u0131zla g\u00fcvenli\u011fi sa\u011flay\u0131n! Unutulan parolalar\u0131 kolayca s\u0131f\u0131rlay\u0131n.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#primaryimage\",\"url\":\"https:\/\/www.vipservis.com\/blog\/wp-content\/uploads\/2025\/08\/almalinuxesxi-sifre-sifirlama.png\",\"contentUrl\":\"https:\/\/www.vipservis.com\/blog\/wp-content\/uploads\/2025\/08\/almalinuxesxi-sifre-sifirlama.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/www.vipservis.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi: Ad\u0131m Ad\u0131m!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.vipservis.com\/blog\/#website\",\"url\":\"https:\/\/www.vipservis.com\/blog\/\",\"name\":\"Vipservis Blog\",\"description\":\"Vipservis Olarak 26 Y\u0131ll\u0131k Tecr\u00fcbemiz ile Cevap Arad\u0131\u011f\u0131n\u0131z T\u00fcm Sorular\u0131 Yaz\u0131yoruz.\",\"publisher\":{\"@id\":\"https:\/\/www.vipservis.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.vipservis.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.vipservis.com\/blog\/#organization\",\"name\":\"Vipservis Bili\u015fim ve \u0130nternet Teknolojileri\",\"url\":\"https:\/\/www.vipservis.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/www.vipservis.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.vipservis.com\/blog\/wp-content\/uploads\/2024\/09\/logo-1.png\",\"contentUrl\":\"https:\/\/www.vipservis.com\/blog\/wp-content\/uploads\/2024\/09\/logo-1.png\",\"width\":500,\"height\":104,\"caption\":\"Vipservis Bili\u015fim ve \u0130nternet Teknolojileri\"},\"image\":{\"@id\":\"https:\/\/www.vipservis.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/vipserviscom\",\"https:\/\/x.com\/vipserviscom\",\"https:\/\/www.instagram.com\/vipserviscom\",\"https:\/\/www.linkedin.com\/company\/vipservis?originalSubdomain=tr\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.vipservis.com\/blog\/#\/schema\/person\/cdb61a7e4f2eef5e8f9550829d769ed2\",\"name\":\"Vipservis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/www.vipservis.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.vipservis.com\/blog\/wp-content\/litespeed\/avatar\/6600f3cb02baa85efeb72add678e6f83.jpg?ver=1776195734\",\"contentUrl\":\"https:\/\/www.vipservis.com\/blog\/wp-content\/litespeed\/avatar\/6600f3cb02baa85efeb72add678e6f83.jpg?ver=1776195734\",\"caption\":\"Vipservis\"},\"sameAs\":[\"https:\/\/vipservis.com\/blog\"],\"url\":\"https:\/\/www.vipservis.com\/blog\/author\/crawk\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi: Ad\u0131m Ad\u0131m! - Vipservis Blog","description":"AlmaLinux VDS ESXi root parolas\u0131n\u0131 s\u0131f\u0131rlama rehberi mi ar\u0131yorsunuz? Ad\u0131m ad\u0131m anlat\u0131m\u0131m\u0131zla g\u00fcvenli\u011fi sa\u011flay\u0131n! Unutulan parolalar\u0131 kolayca s\u0131f\u0131rlay\u0131n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/","og_locale":"tr_TR","og_type":"article","og_title":"AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi: Ad\u0131m Ad\u0131m! - Vipservis Blog","og_description":"AlmaLinux VDS ESXi root parolas\u0131n\u0131 s\u0131f\u0131rlama rehberi mi ar\u0131yorsunuz? Ad\u0131m ad\u0131m anlat\u0131m\u0131m\u0131zla g\u00fcvenli\u011fi sa\u011flay\u0131n! Unutulan parolalar\u0131 kolayca s\u0131f\u0131rlay\u0131n.","og_url":"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/","og_site_name":"Vipservis Blog","article_publisher":"https:\/\/www.facebook.com\/vipserviscom","article_published_time":"2025-08-23T00:18:36+00:00","og_image":[{"width":1536,"height":1024,"url":"https:\/\/www.vipservis.com\/blog\/wp-content\/uploads\/2025\/08\/almalinuxesxi-sifre-sifirlama.png","type":"image\/png"}],"author":"Vipservis","twitter_card":"summary_large_image","twitter_creator":"@vipserviscom","twitter_site":"@vipserviscom","twitter_misc":{"Yazan:":"Vipservis","Tahmini okuma s\u00fcresi":"77 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#article","isPartOf":{"@id":"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/"},"author":{"name":"Vipservis","@id":"https:\/\/www.vipservis.com\/blog\/#\/schema\/person\/cdb61a7e4f2eef5e8f9550829d769ed2"},"headline":"AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi: Ad\u0131m Ad\u0131m!","datePublished":"2025-08-23T00:18:36+00:00","dateModified":"2025-08-23T00:18:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/"},"wordCount":20725,"commentCount":0,"publisher":{"@id":"https:\/\/www.vipservis.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#primaryimage"},"thumbnailUrl":"https:\/\/www.vipservis.com\/blog\/wp-content\/uploads\/2025\/08\/almalinuxesxi-sifre-sifirlama.png","keywords":["\"ESXi\"","\"parola y\u00f6netimi","\"rehber\"","\"root parolas\u0131\"","\"s\u0131f\u0131rlama\"","AlmaLinux","AlmaLinux ESXi root \u015fifre s\u0131f\u0131rlama","AlmaLinux ESXi \u015fifre reset","AlmaLinux GRUB root parolas\u0131","AlmaLinux grub root reset","AlmaLinux parolay\u0131 unuttum","AlmaLinux root parolas\u0131 s\u0131f\u0131rlama","AlmaLinux root password reset","AlmaLinux root \u015fifre unutulursa","AlmaLinux \u015fifre kurtarma ESXi","AlmaLinux \u015fifre s\u0131f\u0131rlama rehberi","AlmaLinux tek kullan\u0131c\u0131 modu root reset","AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi","AlmaLinux VDS root reset","AlmaLinux VDS root \u015fifresi nas\u0131l de\u011fi\u015ftirilir","AlmaLinux VDS \u015fifre kurtarma","AlmaLinux VPS ESXi root reset","AlmaLinux VPS root password unuttum","AlmaLinux VPS root \u015fifresi","AlmaLinux VPS \u015fifre unutuldu","ESXi AlmaLinux root reset","ESXi root password AlmaLinux","g\u00fcvenlik","linux","linux root \u015fifresi s\u0131f\u0131rlama","sanalla\u015ft\u0131rma","VDS"],"articleSection":["Web Hosting"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/","url":"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/","name":"AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi: Ad\u0131m Ad\u0131m! - Vipservis Blog","isPartOf":{"@id":"https:\/\/www.vipservis.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#primaryimage"},"image":{"@id":"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#primaryimage"},"thumbnailUrl":"https:\/\/www.vipservis.com\/blog\/wp-content\/uploads\/2025\/08\/almalinuxesxi-sifre-sifirlama.png","datePublished":"2025-08-23T00:18:36+00:00","dateModified":"2025-08-23T00:18:36+00:00","description":"AlmaLinux VDS ESXi root parolas\u0131n\u0131 s\u0131f\u0131rlama rehberi mi ar\u0131yorsunuz? Ad\u0131m ad\u0131m anlat\u0131m\u0131m\u0131zla g\u00fcvenli\u011fi sa\u011flay\u0131n! Unutulan parolalar\u0131 kolayca s\u0131f\u0131rlay\u0131n.","breadcrumb":{"@id":"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#primaryimage","url":"https:\/\/www.vipservis.com\/blog\/wp-content\/uploads\/2025\/08\/almalinuxesxi-sifre-sifirlama.png","contentUrl":"https:\/\/www.vipservis.com\/blog\/wp-content\/uploads\/2025\/08\/almalinuxesxi-sifre-sifirlama.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.vipservis.com\/blog\/almalinux-vds-esxi-root-parolasini-sifirlama-rehberi-adim-adim\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/www.vipservis.com\/blog\/"},{"@type":"ListItem","position":2,"name":"AlmaLinux VDS ESXi Root Parolas\u0131n\u0131 S\u0131f\u0131rlama Rehberi: Ad\u0131m Ad\u0131m!"}]},{"@type":"WebSite","@id":"https:\/\/www.vipservis.com\/blog\/#website","url":"https:\/\/www.vipservis.com\/blog\/","name":"Vipservis Blog","description":"Vipservis Olarak 26 Y\u0131ll\u0131k Tecr\u00fcbemiz ile Cevap Arad\u0131\u011f\u0131n\u0131z T\u00fcm Sorular\u0131 Yaz\u0131yoruz.","publisher":{"@id":"https:\/\/www.vipservis.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.vipservis.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/www.vipservis.com\/blog\/#organization","name":"Vipservis Bili\u015fim ve \u0130nternet Teknolojileri","url":"https:\/\/www.vipservis.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.vipservis.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.vipservis.com\/blog\/wp-content\/uploads\/2024\/09\/logo-1.png","contentUrl":"https:\/\/www.vipservis.com\/blog\/wp-content\/uploads\/2024\/09\/logo-1.png","width":500,"height":104,"caption":"Vipservis Bili\u015fim ve \u0130nternet Teknolojileri"},"image":{"@id":"https:\/\/www.vipservis.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/vipserviscom","https:\/\/x.com\/vipserviscom","https:\/\/www.instagram.com\/vipserviscom","https:\/\/www.linkedin.com\/company\/vipservis?originalSubdomain=tr"]},{"@type":"Person","@id":"https:\/\/www.vipservis.com\/blog\/#\/schema\/person\/cdb61a7e4f2eef5e8f9550829d769ed2","name":"Vipservis","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/www.vipservis.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.vipservis.com\/blog\/wp-content\/litespeed\/avatar\/6600f3cb02baa85efeb72add678e6f83.jpg?ver=1776195734","contentUrl":"https:\/\/www.vipservis.com\/blog\/wp-content\/litespeed\/avatar\/6600f3cb02baa85efeb72add678e6f83.jpg?ver=1776195734","caption":"Vipservis"},"sameAs":["https:\/\/vipservis.com\/blog"],"url":"https:\/\/www.vipservis.com\/blog\/author\/crawk\/"}]}},"_links":{"self":[{"href":"https:\/\/www.vipservis.com\/blog\/wp-json\/wp\/v2\/posts\/11652","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.vipservis.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.vipservis.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.vipservis.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vipservis.com\/blog\/wp-json\/wp\/v2\/comments?post=11652"}],"version-history":[{"count":1,"href":"https:\/\/www.vipservis.com\/blog\/wp-json\/wp\/v2\/posts\/11652\/revisions"}],"predecessor-version":[{"id":11654,"href":"https:\/\/www.vipservis.com\/blog\/wp-json\/wp\/v2\/posts\/11652\/revisions\/11654"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.vipservis.com\/blog\/wp-json\/wp\/v2\/media\/11653"}],"wp:attachment":[{"href":"https:\/\/www.vipservis.com\/blog\/wp-json\/wp\/v2\/media?parent=11652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.vipservis.com\/blog\/wp-json\/wp\/v2\/categories?post=11652"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.vipservis.com\/blog\/wp-json\/wp\/v2\/tags?post=11652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}